Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Enterprise I.T.
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Win XP, Server 2003 Zero-Day Exploits Use Adobe Reader
Win XP, Server 2003 Zero-Day Exploits Use Adobe Reader

By Jennifer LeClaire
December 2, 2013 1:36PM

    Bookmark and Share
The zero-day exploit, affecting Windows XP and Windows Server 2003, is being abused in the wild in conjunction with an Adobe Reader vulnerability that had a fix published in August 2013, said Wolfgang Kandek, CTO of Qualys: "Users that have the latest version of Adobe Reader are immune to the attack, as well as users that are running on Windows Vista or later."
 


Another month, another zero-day vulnerability. Microsoft is investigating new reports of a vulnerability in a kernel component of Windows XP and Windows Server 2003, accessed using older versions of Adobe Reader.

Redmond said it is aware of limited, targeted attacks that attempt to exploit the flaw. The good news: The company's investigation of the vulnerability has verified that it does not affect customers who are using operating systems newer than Windows XP and Windows Server 2003.

"The vulnerability is an elevation-of-privilege vulnerability. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," Microsoft explained in an alert. "An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights."

Mitigating Factors

There is one mitigating factor that could work in an enterprise's advantage. An attacker needs to have valid log-on credentials and be able to sign in locally to exploit the vulnerability. In other words, the vulnerability could not be exploited remotely or by anonymous users.

There's also a workaround: For environments with non-default, limited user privileges, Microsoft said disabling NDProxy.sys will cause certain services that rely on Windows Telephony Application Programming Interfaces to not function. Services that will no longer work include Remote Access Service, dial-up networking, and virtual private networking.

Redmond is working with partners in its Microsoft Active Protections Program to provide information that they can use to deliver broader protections to customers. Microsoft promised to take the appropriate action to protect customers when the investigation is complete and did not rule out an out-of-cycle patch.

Adobe Reader Connection

We turned to Wolfgang Kandek, CTO at Qualys, for his take on the vulnerability. He told us the exploit is being abused in the wild in conjunction with the Adobe Reader vulnerability that had a fix published in August 2013: "Users that have the latest version of Adobe Reader are immune to the attack, as well as users that are running on Windows Vista or later."

FireEye was the first to uncover the vulnerability. The security research firm said the exploit targets Adobe Reader 9.5.4, 10.1.6, 11.0.02 and earlier versions on Windows XP SP3.

"Those running the latest versions of Adobe Reader should not be affected by this exploit," security researchers Xiaobo Chen and Dan Caselden of FireEye wrote in a blog post. "Post exploitation, the shellcode decodes a PE payload from the PDF, drops it in the temporary directory, and executes it."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Enterprise I.T.
1.   Lessons from Verizon's Threat Report
2.   Hortonworks, Concurrent To Partner
3.   APX Labs Aims To Put Glass in Business
4.   Malware Targets Facebook Users
5.   Zebra Buys Motorola Enterprise Biz


advertisement
Zebra Buys Motorola Enterprise Biz
Pays $3.45B in all-cash deal.
Average Rating:
Lessons from Verizon's Threat Report
Enterprises can learn a thing or two.
Average Rating:
APX Labs Aims To Put Glass in Business
$10M to fund Skylight app for device.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.