Author Topic: Widely used web attack toolkit exploits unpatched MSXML flaw  (Read 2511 times)

Offline OhauitiWeather

  • Hero Member
  • *****
  • Posts: 1977
  • Country: nz
  • Karma: 284
  • Gender: Male
    • Ohauiti Weather
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used web attack toolkits, according to security researchers from antivirus firm Sophos.
 
The security flaw is identified as CVE-2012-1889 and is what security researchers call a zero-day vulnerability -- an actively exploited vulnerability for which an official patch doesn't yet exist.
 
CVE-2012-1889 allows remote attackers to execute malicious code on a user's computer if they convince the user to visit a specially crafted web page in Internet Explorer.
 
On June 12, Microsoft published a security advisory regarding this security flaw and provided users with several work-arounds for it, including a semi-automated "Fix it" solution.
 
Since then, exploit code for the vulnerability was added to the open-source Metasploit penetration testing framework, making it available for anyone to copy and potentially misuse.
 
"Within a week, CVE-2012-1889 exploiting code very similar to that published to Metasploit was seen within the landing page of a Blackhole exploit kit site," said Fraser Howard, a principal virus researcher at Sophos, in a blog post on Friday.
 
Blackhole is one of the most popular exploit toolkits -- malicious web applications designed to exploit vulnerabilities in browser plug-ins and other components in order to distribute malware.
 
Exploit kits are used in the majority of web-based attacks launched from compromised websites and are one of the primary methods of infected computers with malware.
 
The integration of a CVE-2012-1889 exploit into Blackhole could suggest that the number of attacks targeting this flaw will increase significantly. "As soon as we see exploit kits targeting new vulnerabilities we can expect to see a lot more users getting infected - especially if the vulnerabilities are zero-days," Howard said.
 
However, this hasn't happened yet and the use of such an exploit together with Blackhole was limited to one incident detected on June 21. Howard speculated that this might be because the exploit's integration with Blackhole is still unreliable, or because this particular exploit is only available for new, more expensive, versions of the toolkit.
 
Regardless of the reason, the exploit's lack of adoption among Blackhole attackers might only be temporary. Therefore, users should deploy Microsoft's "Fix it" solution as soon as possible and keep their antivirus programs up-to-date in order to block attacks targeting this vulnerability.


Published by Computerworld, By Lucian Constantin | Iasi, Romania | Thursday, 5 July, 2012
Link to article:  http://computerworld.co.nz/news.nsf/news/widely-used-web-attack-toolkit-exploits-unpatched-msxml-flaw?opendocument&utm_source=security&utm_medium=email&utm_campaign=security


David Harris
Ohauiti Weather
WH1091 Wireless Weather Station
Ohauiti Weather :: Home  powered by Cumulus MX 3.0.0 b3041
"If it wasn't for the last minute nothing would ever get done"


Share via twitter

xx
New malware exploits flaw in old versions of Office for Mac

Started by OhauitiWeather

1 Replies
2544 Views
Last post May 06, 2012, 12:11:33 AM
by Tony
xx
CCleaner Malware Attack

Started by iomkiwi

1 Replies
2655 Views
Last post September 19, 2017, 10:35:53 PM
by Wolfie33
xx
Microsoft to patch under-attack XML bug next week

Started by OhauitiWeather

0 Replies
3242 Views
Last post July 06, 2012, 11:25:46 PM
by OhauitiWeather
xx
Shark attack at Muiwai Beach

Started by Suezy

1 Replies
2995 Views
Last post February 27, 2013, 03:06:03 PM
by Weather Display
xx
Ransom malware merged with bank Trojan in new attack

Started by OhauitiWeather

0 Replies
2389 Views
Last post May 03, 2012, 07:25:37 PM
by OhauitiWeather