NAVIGATION MAIN MENU

COMPENDIUM LIBRARY/TWITTER MONITOR
VIDEO GALLERY
Economic News
Newsbrief Archives
Democrat Leadership Twitter and Realtime Feeds
Cabinet twitter and realtime feeds
North America weblog
International weblog
Democrats twitter directory
Latest Government Jobs and Public Tenders
Jobs Matrix
Global Travel Information
Pop Entertainment Forum
Start Portal


Please make a donation to support upkeep of the daily news journal, back archives, twitter feeds and the compendium library.










National Cyber Awareness System

Daily newsbrief journal for June 2012, also see http://www.usdemocrats.com/brief for a global 100-page perpetual brief and follow twitter @usdemocrats


National Cyber Awareness System

Postby admin » Mon Jun 25, 2012 2:50 pm

National Cyber Awareness System

Technical Cyber Security Alert TA12-174A


Microsoft XML Core Services Attack Activity

Original release date: June 22, 2012
Last revised: --
Source: US-CERT


Systems Affected

Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 are affected.
Microsoft Internet Explorer, Microsoft Office 2003, and Microsoft
Office 2007 are affected due to their use of XML Core Services.


Overview

Microsoft Security Advisory (2719615) warns of active attacks using
a vulnerability in Microsoft XML Core Services. Microsoft Internet
Explorer and Microsoft Office can be used as attack vectors.


Description

Microsoft Security Advisory (2719615), a Google Online Security
blog post, Sophos, and other sources report active attacks
exploiting a vulnerability in Microsoft XML Core Services
(CVE-2012-1889). Attack scenarios involve exploits served by
compromised web sites and delivered in Office documents. Reliable
public exploit code is available, and attacks may become more
widespread.


Impact

By convincing a victim to view a specially crafted web page or
Office document, an attacker could execute arbitrary code and take
any action as the victim.


Solution

As of June 22, 2012, a comprehensive update is not available.
Consider the following workarounds.

Apply Fix it

Apply the Fix it solution described in Microsoft Knowledge Base
Article 2719615. This solution uses the Application
Compatibility Database feature to make runtime modifications to
XML Core Services to patch the vulnerability.

Disable scripting

Configure Internet Explorer to disable Active Scripting in the
Internet and Local intranet zones as described in Microsoft
Security Advisory (2719615). See also Securing Your Web Browser.

Use the Enhanced Mitigation Experience Toolkit (EMET)

EMET is a utility to configure Windows runtime mitigation
features such as Data Execution Prevention (DEP), Address Space
Layout Randomization (ASLR), and Structured Exception Handler
Overwrite Protection (SEHOP). These features, particularly the
combination of system-wide DEP and ASLR, make it more difficult
for an attacker to successfully exploit a vulnerability.
Configure EMET for Internet Explorer as described in Microsoft
Security Advisory (2719615).


References

* Microsoft Security Advisory (2719615) -
<https://technet.microsoft.com/en-us/security/advisory/2719615>

* Microsoft Security Advisory: Vulnerability in Microsoft XML Core
Services could allow remote code execution -
<http://support.microsoft.com/kb/2719615>

* NVD Vulnerability Summary for CVE-2012-1889 -
<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1889>

* Microsoft XML vulnerability under active exploitation -
<http://googleonlinesecurity.blogspot.com/2012/06/microsoft-xml-vulnerability-under.html>

* European aeronautical supplier's website infected with "state-sponsored" zero-day exploit -
<http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/>

* Securing Your Web Browser -
<https://www.us-cert.gov/reading_room/securing_browser/>

* Application Compatibility Database -
<http://msdn.microsoft.com/en-us/library/bb432182(v=vs.85).aspx>


Revision History

June 22, 2012: Initial release
admin
Site Admin
 
Posts: 82092
Joined: Fri Nov 27, 2009 7:00 am

Return to June 2012

Who is online

Users browsing this forum: No registered users and 29 guests

cron