[ Vodomar @ 18.09.2012. 12:34 ] @


Imamo novi 0-day napad na IE od autora koji su prethodnih nedelja napadali javu.

Naravno nadam se da ne koristite IE već Google Chrome eventualno Firefox.

Ipak,ovaj tekst na Ars Technici ima jedan značajan citat:
Citat:
Even when people don't actively use IE, many utilities and third-party applications make use of IE code. That opens the possibility that people on public WiFi systems and other unsecured networks could inject malicious code into a victim's Web traffic in an attempt to exploit the vulnerability.

"Just keep in mind that even if you don't use IE for day-to-day browsing, a lot of tools you use do embed IE and those are vulnerable," Moore said
.

Microsoft je noćas objavio Microsoft Security Advisory (2757760) obratite pažnju na sekciju Suggested Actions.

[ Goran Mijailovic @ 18.09.2012. 13:26 ] @
Citat:
Suggested Actions

Apply Workarounds

Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. See the next section, Workarounds, for more information.Deploy the Enhanced Mitigation Experience Toolkit

Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from successfully being exploited by applying in-box mitigations such as DEP to applications configured in EMET.

At this time, EMET is provided with limited support and is only available in the English language. For more information, see Microsoft Knowledge Base Article 2458544.

Configure EMET for Internet Explorer from the EMET user interface

To add iexplore.exe to the list of applications using EMET, perform the following steps:

Click Start, All Programs, Enhanced Mitigation Experience Toolkit, and EMET 3.0.
Click Yes on the UAC prompt, click Configure Apps, then select Add. Browse to the application to be configured in EMET.

For 32-bit installations of Internet Explorer the location is:
C:\Program Files (x86)\Internet Explorer\iexplore.exe

Note For 32-bit systems, the path is c:\program files\Internet Explorer\iexplore.exe

For 64-bit installations of Internet Explorer the location is:
C:\Program Files\Internet Explorer\iexplore.exe
Click OK and exit EMET.

Download:
Enhanced Mitigation Experience Toolkit v3.0
http://www.microsoft.com/en-us/download/details.aspx?id=29851

Enhanced Mitigation Experience Toolkit v3.5 Tech Preview
http://www.microsoft.com/en-us/download/details.aspx?id=30424
[ Vodomar @ 18.09.2012. 17:11 ] @
Ovaj EMET je lepa stvarčica i pod njegovu zaštitu sam stavio sve .exe fajlove programa koji imaju internet pristup:pretraživače,playere,flash,javu(dok sam je imao),office programe,mail klijent(dok sam ga imao),uTorrent,pdf viewer...
[ Vodomar @ 20.09.2012. 00:15 ] @


FIX IT!

Microsoft Security Advisory: Vulnerability in Internet Explorer could allow remote code execution
http://support.microsoft.com/kb/2757760

zvanični Update u petak
[ jvcdrama @ 20.09.2012. 02:09 ] @
Citat:
Vodomar:
Ovaj EMET je lepa stvarčica i pod njegovu zaštitu sam stavio sve .exe fajlove programa koji imaju internet pristup:pretraživače,playere,flash,javu(dok sam je imao),office programe,mail klijent(dok sam ga imao),uTorrent,pdf viewer...


A sta radis sa sajtevima i ostalim glupostima koji ne sljakaju bez jave? Interesuje me jer me opasno smara ta java i imam osecaj da losije radi racunar sa njom.. Mozda je glupo pitanje, al ko pita ne skita :)
[ Vodomar @ 20.09.2012. 08:26 ] @
vidi temu Vanredni Java update prvi post.
[ Goran Mijailovic @ 20.09.2012. 16:26 ] @
Sta rade ova dva Fix It-a?
[ Vodomar @ 21.09.2012. 14:49 ] @
zaštita procesa bez emeta i podešavanje internet zona bez korisnika ali sačekaću update verovatno večeras posle 19h
[ Vodomar @ 21.09.2012. 18:30 ] @
Microsoft Security Bulletin MS12-063 - Critical
Cumulative Security Update for Internet Explorer (2744842)

proverite Windows Update

i time je ova tema završena.
[ agasoft @ 21.09.2012. 18:42 ] @
Završena, update prošao.
:)