torsdag 3 januari 2013

Pro-aktivt skydd för ny 0-dagarssårbarhet





Zscaler, som arbetar med Microsoft genom MAPPs-programmet, ger ett pro-aktivt skydd för den nya 0-dagarssårbarhet i Internet Explorer 6,7 och 8. Sårbarheten medför att en angripare kan exekvera godtycklig kod på ett sårbart system. 


Reports recently emerged on malware hosted at the Council on Foreign Relations (CFR) website that was leveraging a previously unknown vulnerability. It is being called a 'watering hole' attack as it is believed that the CFR website was specifically selected to target particular users of the site. At the present time, Microsoft has released a security advisory (2794220) detailing the vulnerability and recommended workarounds until a patch is available. The Zscaler cloud will detect and block websites leveraging this new vulnerability. Zscaler will continue to monitor exploits associated with this issue and deliver additional protections as needed.


Microsoft Security Advisory (2794220)

Affected Software:

  • Internet Explorer 6 
  • Internet Explorer 7 
  • Internet Explorer 8 

CVE-2012-4792 Vulnerability in Internet Explorer Could Allow Remote Code Execution

Description: The vulnerability is a remote code execution vulnerability that exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.