onsdag 10 april 2013

Zscaler skyddar mot "0-Day Vulnerability" i Internet Explorer som används i CFR "Watering Hole"-attacker


Zscaler, som arbetar tillsammans med Microsoft via deras MAPPs-program har proaktivt utvecklat skydd för följande två sårbarheter i Microsoft security bulletins April 2013. Zscaler fortsätter att monitorera exploits som förknippas med de aktuella sårbarheterna och utvecklar löpande nya skydd om det blir nödvändigt.

MS13-029 – Vulnerability in Remote Desktop Client Could Allow Remote Code Execution
Severity: Critical
Affected Software
  • Microsoft XP
  • Microsoft Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7

CVE-2013-1296 RDP ActiveX Control Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Remote Desktop ActiveX control, mstscax.dll, attempts to access an object in memory that has been deleted. An attacker could exploit the vulnerability by convincing the user to visit a specially crafted webpage. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.


MS13-035 – Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege
Severity: Important
Affected Software
  • Microsoft InfoPath 2010 Service Pack 1
  • Microsoft Sharepoint Server 2010 Service Pack 1
  • Microsoft Groove Server 2010 Service Pack 1
  • Microsoft Sharepoint Foundation 2010 Service Pack 1
  • Microsoft Office Web Apps 2010 Service Pack 1
CVE-2013-1289 HTML Sanitization Vulnerability
Description: An elevation of privilege vulnerability exists in the way that HTML strings are sanitized. An attacker who successfully exploited this vulnerability could perform cross-site scripting attacks on affected systems and run script in the security context of the current user.