|
A Sudden Rise in ActiveX Vulnerabilities Part 1 |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : The year 2006 saw the rise of numerous security trends such as attacks against social networks, initiatives by researchers to sequentially disclose many flaws in Web browsers and operating system kernels, attacks being used for financial gain, and a dramatic increase in the number of vulnerabilities affecting Web applications. During the last few months of the year, I have noticed another trend that did not receive much attention. There has been a significant increase in the vulnerabilities that affect ActiveX controls. These vulnerabilities can facilitate an assortment of attacks that may simply cause the disclosure of sensitive information to an attacker or, in the worst-case scenario, allow them to execute code to gain unauthorized access to an affected computer. During the last few years there has been an increase in the number of vulnerabilities affecting ActiveX controls shipped by various vendors. In the year 2001, DeepSight Alert Services reported a single vulnerability affecting an AcitveX control. This number reached 50 during 2006. Image-1.jpg Vulnerabilities affecting ActiveX controls over the past 6 years Interestingly, there has also been a rise in ActiveX vulnerabilities during the last 6 months of 2006, and this trend applies to the quarterly figures as well. The first half of 2006 saw the release of 12 vulnerabilities, while in the second half the number jumped to more than triple that amount to 42. Similarly, during the first quarter of 2006, three ActiveX vulnerabilities were reported. This was followed by nine in the second quarter, 13 in the third quarter, and 26 in the fourth. Image-2.jpg Vulnerabilities affecting ActiveX controls during 2006 This rise of vulnerabilities in ActiveX controls can be attributed to a variety of reasons. These include an increasing number of vendors shipping insecure ActiveX controls and the availability of a variety of security testing tools and ActiveX fuzzers that allow researchers and attackers to rapidly find vulnerabilities with relative ease. The rise of vulnerabilities might also be due to the prospects of finding critical vulnerabilities that facilitate remote unauthorized access in the context of the client application. An article published on SecurityFocus in August 2006 reported a security researcher s claims of discovering more than 100 vulnerabilities in ActiveX controls included with the default installation of Microsoft Windows XP. HD Moore, founder of the Metasploit framework, said that these vulnerabilities are likely to be disclosed to the public when fixes are available from the vendor. The researcher also released a version of the AxMan ActiveX Fuzzer that was used to find these vulnerabilities. Though the year 2006 saw a significant increase in the number of vulnerabilities in ActiveX controls, this trend will likely continue in 2007 due the availability of tools and increased interest in ActiveX security in the community. It is imperative that users have a basic familiarity with the technology behind ActiveX in order to take some precautions to protect themselves against potential attacks. In my next post I will talk more about ActiveX technology and some mitigating strategies that users may employ to prevent attacks. To be continued in Part 2...
Les mots clés de la revue de presse pour cet article : activex Les éléments de la revue Twitter pour les mots clé : activex
Les derniers articles du site "Symantec Connect Security Response Billets" :
- What you need to know about election apps and your personal data - Microsoft Patch Tuesday April 2016 - New Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits - Latest Intelligence for March 2016 - New Flash zero-day exploited by attackers in the wild - Samsam may signal a new trend of targeted ransomware - Four tax scams to watch out for this tax season - Most prevalent Android ransomware in the West arrives in Japan - Taiwan targeted with new cyberespionage back door Trojan - Seven Iranians charged in relation to cyberattacks against US
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|