![]() |
contents | software | |||||||
| eEye Digital Security Protects from the New Critical Flaw in Windows ![]() This unspecified vulnerability exists within multiple versions of Microsoft Windows operating systems and allows for a remote attacker to execute arbitrary code under the context of the logged-in user. This vulnerability can be exploited by visiting a malicious web site or opening a malformed Microsoft Office document. This zero-day vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials. The impact of this exploit can vary from the reported Trojan installation to full system compromise by coupling this attack with a privilege escalation vulnerability to acquire SYSTEM access, which would provide the attacker complete control over the compromised host. The most potent attack method used by this vulnerability is conducted by embedding a malicious .ANI file within an HTML web page. Doing so allows the vulnerability to be exploited with minimal user interaction by simply coaxing a user to follow a hyperlink and visit a malicious web site. Other exploit vectors exist including Microsoft Office applications since they also rely on the same .ANI processing code, making email delivery also a potent threat by using Microsoft Office attachments. write your comments about the article :: © 2007 Computing News :: home page |