« 
SANS Log Management 2006 ... | 
Update on zero day Word v... »
                        
                            Zero information on zero day vulnerability in Word
                        
                            Fri, 19 May 2006 15:30:04 GMT
                        
                            
    A couple hours ago, my Google sidebar lit up with new postings about the new vulnerability in Word, discovered by Symantec, that apparently opens a back door.
    I am frustrated at the total lack of detail on this so far and no other recommendation than to be careful about Word attachments - even blocking them at the email gateway.
    How long does it take to produce a signature update or give more information about how bad the vulnerability is?
    The reports I’ve seen say it opens a back door but what kind of back door? Does it open a port for incoming connections or does it actively check a rogue site for zombie commands? Are you protected if you have Windows Firewall?
    So far the best information I’ve seen is at http://isc.sans.org/diary.php?compare=1&storyid=1345.  
    If you have thoughts or information on this let me know. I’ll make sure you receive credit.
  
                         
                        
                            
                            
                                                       
                            
                        
                        
                                
                                
                        
                            
                            email this
                            •
                            
                            digg
                            •
                            
                            reddit
                            •
                            
                            dzone
                            
                            
                            
                            comments (0)
                            •
                            references (0)
                            
                            
                        
                        
                            Related:
                            Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
Severing the Horizontal Kill Chain:  The Role of Micro-Segmentation in  Your Virtualization Infrastructure 
5 Indicators of Endpoint Evil
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond
                        
                    
                    Comments disabled
powered by Bloget™