MS06-049 re-release
When Microsoft release the out-of-cycle patch for the VML exploit, they also re-released MS06-049 (again) which was responsible for causing corruption of compressed NTFS files on Windows 2000 systems. You can find more info from Microsoft here
0 comment(s)
* VML Update Released
Microsoft has just released an update to address the VML (VGX) issue
The update can currently be found on Microsoft Update and is titled
Security Update for Windows XP (KB925486)
http://www.microsoft.com/technet/security/Bulletin/MS06-055.mspx
It is recommended that the patch be applied immediately (after testing) unless a suitable mitigation strategy is in place.
Update: Also, note that if you applied the ACL mitigation (removing Everyone Read access from the DLL), you will need to undo that before this update will apply successfully.
Thanks to everyone that submitted analysis, news, samples, malicious website reports, etc
More info:
http://isc.sans.org/diary.php?storyid=1727
http://blogs.technet.com/msrc/archive/2006/09/26/459194.aspx
The update can currently be found on Microsoft Update and is titled
Security Update for Windows XP (KB925486)
http://www.microsoft.com/technet/security/Bulletin/MS06-055.mspx
It is recommended that the patch be applied immediately (after testing) unless a suitable mitigation strategy is in place.
Update: Also, note that if you applied the ACL mitigation (removing Everyone Read access from the DLL), you will need to undo that before this update will apply successfully.
Thanks to everyone that submitted analysis, news, samples, malicious website reports, etc
More info:
http://isc.sans.org/diary.php?storyid=1727
http://blogs.technet.com/msrc/archive/2006/09/26/459194.aspx
Keywords:
0 comment(s)
Deja Vu - Request for W32.Pasobir Malware Sample
If any of ISC participants have a sample of W32.Pasobir we'd really appreciate a submission via our contact page.
Thanks!
**snip**
"Periodically checks for both fixed and removable drives starting with drive D: that are attached to the system and copies itself as the following file:
[DRIVE LETTER]:\sxs.exe
Creates the following file containing instructions to start the worm when the drive is attached to the system:
[DRIVE LETTER]:\autorun.inf"
Thanks!
**snip**
"Periodically checks for both fixed and removable drives starting with drive D: that are attached to the system and copies itself as the following file:
[DRIVE LETTER]:\sxs.exe
Creates the following file containing instructions to start the worm when the drive is attached to the system:
[DRIVE LETTER]:\autorun.inf"
Keywords:
0 comment(s)
×
Diary Archives
Comments
www
Nov 17th 2022
6 months ago
EEW
Nov 17th 2022
6 months ago
qwq
Nov 17th 2022
6 months ago
mashood
Nov 17th 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
isc.sans.edu
Dec 26th 2022
5 months ago
isc.sans.edu
Dec 26th 2022
5 months ago