home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 271 of 523   
   Ben Ritchey to All   
   US-CERT alert   
   15 Jul 15 01:15:55   
   
   NCCIC / US-CERT   
      
   National Cyber Awareness System:   
      
   TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities   
   07/14/2015 07:13 PM EDT   
      
      
   Original release date: July 14, 2015   
      
   Systems Affected   
   Microsoft Windows systems with Adobe Flash Player installed.   
      
   Overview   
   Used in conjunction, recently disclosed vulnerabilities in Adobe Flash and   
   Microsoft Windows may allow a remote attacker to execute arbitrary code with   
   system privileges. Since attackers continue to target and find new   
   vulnerabilities in popular, Internet-facing software, updating is not   
   sufficient, and it is important to use exploit mitigation and other defensive   
   techniques.   
      
   Description   
   The following vulnerabilities illustrate the need for ongoing mitigation   
   techniques and prioritization of updates for highly targeted software:   
      
   Adobe Flash use-after-free and memory corruption vulnerabilities   
   (CVE-2015-5119, CVE-2015-5122, CVE-2015-5123) Adobe Flash Player contains   
   critical vulnerabilities within the ActionScript 3 ByteArray, opaqueBackground   
   and BitmapData classes. Exploitation of these vulnerabilities could allow a   
   remote attacker to execute arbitrary code on a vulnerable system.   
   Microsoft Windows Adobe Type Manager privilege escalation vulnerability   
   (CVE-2015-2387)   
   The Adobe Type Manager module contains a memory corruption vulnerability,   
   which can allow an attacker to obtain system privileges on an affected Windows   
   system. The Adobe Type Manager is a Microsoft Windows component present in   
   every version since NT 4.0. The primary impact of exploiting this   
   vulnerability is local privilege escalation.   
   Vulnerability Chaining   
   By convincing a user to visit a website or open a file containing specially   
   crafted Flash content, an attacker could combine any one of the three Adobe   
   Flash vulnerabilities with the Microsoft Windows vulnerability to take full   
   control of an affected system.   
      
   A common attack vector for exploiting a Flash vulnerability is to entice a   
   user to load Flash content in a web browser, and most web browsers have Flash   
   installed and enabled. A second attack vector for Flash vulnerabilities is   
   through a file (such as an email attachment) that embeds Flash content.   
   Another technique leverages Object Linking and Embedding (OLE) capabilities in   
   Microsoft Office documents to automatically download Flash content from a   
   remote server.   
      
   An attacker who is able to execute arbitrary code through the Flash   
   vulnerability could exploit the Adobe Type Manager vulnerability to gain   
   elevated system privileges. The Adobe Type Manager vulnerability allows the   
   attacker to bypass sandbox defenses (such as those found in Adobe Reader and   
   Google Chrome) and low integrity protections (such as Protected Mode Internet   
   Explorer and Protected View for Microsoft Office).   
      
   Impact   
   The Adobe Flash vulnerabilities can allow a remote attacker to execute   
   arbitrary code. Exploitation of the Adobe Type Manager vulnerability could   
   then allow the attacker to execute code with system https://www.   
   icrosoft.com/en-us/download/details.aspx?id=46366privileges.   
      
   Solution   
   Since attackers regularly target widely deployed, Internet-accessible software   
   such as Adobe Flash and Microsoft Windows, it is important to prioritize   
   updates for these products to defend against known vulnerabilities.   
      
   Since attackers regularly discover new vulnerabilities for which updates do   
   not exist, it is important to enable exploit mitigation and other defensive   
   techniques.   
      
   Apply Security Updates   
   The Adobe Flash vulnerabilities (CVE-2015-5119, CVE-2015-5122, CVE-2015-5123)   
   are addressed in Adobe Security Bulletins APSB15-16 and APSB15-18. Users are   
   encouraged to review the Bulletins and apply the necessary updates.   
      
   The Microsoft Windows Adobe Type Manager vulnerability (CVE-2015-2387) is   
   addressed in Microsoft security Bulletin MS15-077. Users are encouraged to   
   review the Bulletin and apply the necessary updates.   
      
   Additional information regarding the vulnerabilities can be found in   
   Vulnerability Notes VU#561288, VU#338736, VU#918568, and VU#103336.   
      
   Limit Flash Content   
   Do not run untrusted Flash content. Most web browsers have Flash enabled by   
   default, however, it may be possible to enable click-to-play features. For   
   information see http://www.howtogeek.com/188059/how-to-enable-cl   
   ck-to-play-plugins-in-every-we b-browser/   
      
   Use the Microsoft Enhanced Mitigation Experience Toolkit (EMET)   
   EMET can be used to help prevent exploitation of the Flash vulnerabilities. In   
   particular, Attack Surface Reduction (ASR) can be configured to help restrict   
   Microsoft Office and Internet Explorer from loading the Flash ActiveX control.   
   See the following link for additional information: http://www.mi   
   rosoft.com/en-us/download/details.aspx?id=46366   
      
   References   
   [1] http://www.kb.cert.org/vuls/id/561288   
   [2] http://www.kb.cert.org/vuls/id/103336   
   [3] http://www.kb.cert.org/vuls/id/338736   
   [4] http://www.kb.cert.org/vuls/id/918568   
   [5] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5119   
   [6] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5119   
   [7] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5123   
   [8] http://helpx.adobe.com/security/products/flash-player/apsb15-16.html   
   [9] https://helpx.adobe.com/security/products/flash-player/apsb15-18.html   
   [10] http://www.howtogeek.com/188059/how-to-enable-click-to-play   
   plugins-in-every-we b-browser   
   [11] https://www.microsoft.com/en-us/download/details.aspx?id=46366   
   Revision History   
   July 14, 2015: Initial Release   
      
   ----------------------------------------------------------------   
   -------------- -   
      
   This product is provided subject to this Notification and this Privacy & Use   
   policy.   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or have questions, please send an email to info@us-cert.gov. Do not reply to   
   this message since this email was sent from a notification-only address that   
   is not monitored. To ensure you receive future US-CERT products, please add   
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT)  245 Murray Lane   
   SW Bldg 410  Washington, DC 20598  (888) 282-0870 Powered by GovDelivery   
      
      
      
   --   
   Guardien Fide   :^)   
      
      Ben  aka cMech  Web: http://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca