Adobe 0-day in the wild - again
Update2: : It looks like Adobe will not be releasing an update to resolve this issue until Jan 12! Find their full advisory with the release date here ==> http://www.adobe.com/support/security/advisories/apsa09-07.html
Handler on Duty: Rob VandenBrink
------------------------------------------------
Update1: One of the samples that we had access shows the following behavior that could help you to identify infections in your network/system:
The exploit has the executable included: AdobeUpdate.exe - Size 9.356k (hash 069175846447506b3811632535395bc3 ).
This executable will download another file called ab.exe (and save it as winver32.exe on C:windows folder). You may also check your logs for the website hxxp://foruminspace.com . This file is hosted there.
The current sample has the following specs: Size 386,016k and hash 686738eb5bb8027c524303751117e8a9 .
-------------------------------------------------
Handler on Duty: Pedro Bueno (pbueno //&&// isc. sans. org)
Twitter: twitter.com/besecure
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
It's not ground hog day, but it surely feels like it. The Shadowserver Foundation [1] is reporting about spotting another Adobe 0-day in the wild
Adobe acknowledged the issue in a PSIRT post [2].
The quick summary: The is currently no patch available and commonly used anti-virus products appear to be mostly missing it. The bug requires JavaScript. Turning off JavaScript support appears to be your best defense. I could recommend that you don't open any malicious PDFs. But it would probably be as useful to go and hide in a cave until all Adobe bugs got fixed.
Please let us know if you find any malicious PDFs like this, and let the Adobe PSIRT know as well.
[1] http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214
[2] http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html
------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter
Important BIND name server updates - DNSSEC
Over the first half of 2010, ICANN/IANA plan to sign the root zone [1]. The DNSSEC signature will use SHA256 hashes, which are not supported in older but common versions of BIND. If you run BIND 9.6.0 or 9.6.0P1, you may have issues with these signatures. The bug was fixed in BIND 9.6.1.
From the ISC.org mailing list:
ISC has arranged for two test zones to be made available which are
signed using the new algorithms which are listed in dlv.isc.org.
You can test whether you can successfully resolve these zones using the
following queries.
dig rsasha256.island.dlvtest.dns-oarc.net soa
dig rsasha512.island.dlvtest.dns-oarc.net soa
[1] http://www.icann.org/en/announcements/announcement-2-09oct08-en.htm
[2] https://www.isc.org/software/bind/dnssec
------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter
Comments
www
Nov 17th 2022
6 months ago
EEW
Nov 17th 2022
6 months ago
qwq
Nov 17th 2022
6 months ago
mashood
Nov 17th 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
isc.sans.edu
Dec 26th 2022
5 months ago
isc.sans.edu
Dec 26th 2022
5 months ago