Security firms warn of new Microsoft threats
More Trojan horses target a known IE flaw, while a vulnerability is reported in SQL database
Computerworld - Two security firms today issued new warnings about two separate threats affecting Microsoft Corp. products.
Sophos PLC reported evidence of new malware planted on Web sites that exploits a previously announced -- and as-yet-unpatched -- Internet Explorer security vulnerability. The Clunky-B Trojan horse allows hackers to install and run malicious software on users' machines when they visit sites containing the malware, said Graham Cluley, a senior technology consultant at Sophos.
The code is only the latest of several Trojan horses seeking to exploit an Internet Explorer vulnerability that Microsoft first disclosed in May. At that time, the flaw wasn't considered very serious because it was believed that hackers who exploited it would only be able to shut browsers down while causing little other damage, Cluley said.
The recent emergence of Trojan horses targeting the flaw, however, prompted Microsoft to issue an advisory last week. That advisory was updated on Tuesday to inform users that it was aware of the proof-of-concept code and is investigating the matter (see "Attackers targeting unpatched IE bug, Microsoft warns").
"Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs," the company said in that advisory. Microsoft's next security update is due on Dec. 13.
For the moment, at least, there is little evidence that the Trojan horse code poses a major threat to most Internet users, Cluley said. The only users likely to get infected are those who visit pornographic sites. But it's possible that hackers could soon start planting the malware on other sites they may have compromised, he said.
Until a fix is available from Microsoft, users should consider changing the configuration of Internet Explorer to turn off or prompt before allowing Active Scripting to run, Sophos said in its advisory.
Meanwhile, a separate security advisory came from database security vendor Imperva Inc ., which warned users of a vulnerability it discovered in Microsoft's SQL Sever 2000 database that allows potential attackers to mask their log-in names from the software's audit tools.
Users who take advantage of the flaw could gain access to a vulnerable database and take any action they want without fear of their actions being audited, Imperva CEO Shlomo Kramer said.
Microsoft issued an advisory informing users of the problem on Wednesday in which it tells users how to detect the problem and work around it.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts