Showing posts with label advisory. Show all posts
Showing posts with label advisory. Show all posts

Wednesday, March 8, 2017

Microsoft Security Advisory 3046015 FREAK

Microsoft Security Advisory 3046015 FREAK


Security Advisory
Microsoft released Security Advisory 3046015 which relates to the SSL/TLS issue referred being referred to as “FREAK” (Factoring attack on RSA-EXPORT Keys).

Most of the publicity surrounding FREAK has been addressing the vulnerability in the Safari, Chrome and Android browsers with OS X, iOS and Android.  However, the flaw also affects many popular websites.  As described in the Security Advisory:
"The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the cipher used in an SSL/TLS connection on a Windows client system to weaker individual ciphers that are disabled but part of a cipher suite that is enabled."
The problem is that it isnt only the browser that is vulnerable but websites as well.  Are you or the sites you frequent vulnerable?  To find out, do the following:
  • Test your browser for the FREAK Vulnerability at https://freakattack.com/.  
  • A list of websites known to be vulnerable to FREAK is at https://freakattack.com/vulnerable.txt.  You can also check websites you frequent at SSL Server Test, although if vulnerable, it is up to the website to update their server. 
To learn more about FREAK, see Time to FREAK out? How to tell if youre vulnerable | Computerworld by Gregg Keizer.

References:

  • CVE Reference:  CVE-2015-1637
  • MSRC: Security Advisory 3046015 released
  • Tech Net Advisory: Microsoft Security Advisory 3046015 Vulnerability in Schannel Could Allow Security Feature Bypass
  • Tracking the FREAK Attack 



Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...

Available link for download

Wednesday, January 11, 2017

Microsoft Security Advisory 3010060 with Fixit Solution

Microsoft Security Advisory 3010060 with Fixit Solution


Security Advisory
Microsoft released Security Advisory 3010060 which relates to a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003.

The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object. Microsoft is aware of limited, targeted attacks. 

Recommendations

Microsoft has made available a Fix it solution "OLE packager shim workaround" which prevents execution of the vulnerability.  Below are direct links to both enable and disable the Fix it solution.



NoteThe Fix it solution is not at this time for 64-bit editions of PowerPoint on x64-based editions of Windows 8 and Windows 8.1. 
 
Enable Fix itDisable Fix it
Microsoft Fix it
Microsoft Fix it 51026
Microsoft Fix it
Microsoft Fix it 51027 


Another option is to install the Enhanced Mitigation Experience Toolkit (EMET), described in the "workarounds" section of the Tech Net Advisory.

References:

  • CVE Reference:  CVE-2014-6352
  • Microsoft KB Article 3010060: Microsoft security advisory: Vulnerability in Microsoft OLE could allow remote code execution: October 21, 2014
  • MSRC: Security Advisory 3010060 released
  • Tech Net Advisory: Microsoft Security Advisory 3010060 Vulnerability in Microsoft OLE Could Allow Remote Code Execution



Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...

Available link for download