Results 1 to 10 of 21

Thread: 0-Day vuln Exploit in the wild - Animated Cursor

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation 0-Day vuln Exploit in the wild - Animated Cursor

    FYI...

    > http://www.websense.com/securitylabs...hp?AlertID=762
    March 29, 2007 ~ "WebsenseŽ Security Labs™ is currently monitoring an unpatched (0-day) vulnerability in Microsoft Windows. No user interaction is necessary for the exploit to be successful. A computer may become infected by simply visiting a malicious website. This vulnerability exists in the way animated cursors are processed, and is very similar to MS05-002 ( http://www.microsoft.com/technet/sec.../MS05-002.mspx ) which was patched by Microsoft in early 2005. At this time, we are aware of 9 different sites hosting the new exploit. We will continue to monitor for any additional sites, as we expect the exploit's usage to increase. One of the sites involved is the same one which targeted Dolphin Stadium during the Super Bowl. It is likely that the same group is behind the current attack. Additional details on the vulnerability are available from Microsoft Security Advisory #935423: http://www.microsoft.com/technet/sec...ry/935423.mspx ."

    > http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1765

    Last edited by AplusWebMaster; 2007-03-30 at 12:08. Reason: Added CVE reference...
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #2
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    - http://isc.sans.org/diary.html?storyid=2539
    Last Updated: 2007-03-30 10:40:08 UTC ~ "A short overview of how the different email clients (in the supported list of Microsoft) are reacting to the animated cursor vulnerability depending on the actions and settings of the email client. The surprising element is that read in plain text mode makes some of the clients more vulnerable and actually only offers real added value for Outlook 2003..."

    (Chart available at the URL above.)


    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #3
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation

    FYI...

    > http://isc.sans.org/diary.html?storyid=2540
    Last Updated: 2007-03-30 21:19:28 UTC ...(Version: -3-)
    "...Domains/IPs currently being used in exploitation:
    1.520sb.cn
    220.71.76.189
    222.73.220.45
    55880.cn
    81.177.26.26
    85.255.113.4
    bc0.cn
    client.alexa.com
    count12.51yes.com
    count3.51yes.com
    d.77276.com
    fdghewrtewrtyrew.biz
    i5460.net
    jdnx.movie721.cn
    newasp.com.cn
    s103.cnzz.com
    s113.cnzz.com
    ttr.vod3369.cn
    uniq-soft.com
    wsfgfdgrtyhgfd.net
    04080.com
    33577.cn
    baidu.com
    h3210.com
    hackings.cn
    koreacms.co.kr
    macrcmedia.com
    macrcmedia.net
    ncph.net
    xxx.cn
    ym52099.512j.com
    jonnyasp.com ..."

    Do NOT visit these URLs...

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •