Security firms warn of new Microsoft threats
More Trojan horses target a known IE flaw, while a vulnerability is reported in SQL database
Computerworld - Two security firms today issued new warnings about two separate threats affecting Microsoft Corp. products.
Sophos PLC reported evidence of new malware planted on Web sites that exploits a previously announced -- and as-yet-unpatched -- Internet Explorer security vulnerability. The Clunky-B Trojan horse allows hackers to install and run malicious software on users' machines when they visit sites containing the malware, said Graham Cluley, a senior technology consultant at Sophos.
The code is only the latest of several Trojan horses seeking to exploit an Internet Explorer vulnerability that Microsoft first disclosed in May. At that time, the flaw wasn't considered very serious because it was believed that hackers who exploited it would only be able to shut browsers down while causing little other damage, Cluley said.
The recent emergence of Trojan horses targeting the flaw, however, prompted Microsoft to issue an advisory last week. That advisory was updated on Tuesday to inform users that it was aware of the proof-of-concept code and is investigating the matter (see "Attackers targeting unpatched IE bug, Microsoft warns").
"Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs," the company said in that advisory. Microsoft's next security update is due on Dec. 13.
For the moment, at least, there is little evidence that the Trojan horse code poses a major threat to most Internet users, Cluley said. The only users likely to get infected are those who visit pornographic sites. But it's possible that hackers could soon start planting the malware on other sites they may have compromised, he said.
Until a fix is available from Microsoft, users should consider changing the configuration of Internet Explorer to turn off or prompt before allowing Active Scripting to run, Sophos said in its advisory.
Meanwhile, a separate security advisory came from database security vendor Imperva Inc ., which warned users of a vulnerability it discovered in Microsoft's SQL Sever 2000 database that allows potential attackers to mask their log-in names from the software's audit tools.
Users who take advantage of the flaw could gain access to a vulnerable database and take any action they want without fear of their actions being audited, Imperva CEO Shlomo Kramer said.
Microsoft issued an advisory informing users of the problem on Wednesday in which it tells users how to detect the problem and work around it.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!