Attacks started on users of Internet Explorer and RealPlayer 0day exploit.

I haven’t really heard of many RealPlayer exploits, however this zero day one is a nasty. This is an Internet Explorer exploit only, so if you’re using FireFox you’re in luck.

I haven’t really heard of many RealPlayer exploits, however this zero day one is a nasty. This is an Internet Explorer exploit only, so if you’re using FireFox you’re in luck.

October 19, 2007 (Computerworld) — Attackers are exploiting a zero-day vulnerability in RealPlayer in order to infect Windows machines running Internet Explorer, Symantec Corp. said late Thursday. The security company issued an alert that rated the threat with its highest possible score.

According to a warning issued to customers of its DeepSight threat network, Symantec said an ActiveX control installed by RealNetworks Inc.’s RealPlayer program is flawed. When combined with Microsoft Corp.’s Internet Explorer (IE) browser — which relies on ActiveX controls to extend its functionality — the bug can be exploited and malicious code downloaded to any PC that wanders to a specially crafted site.

Only systems on which both RealPlayer and IE have been installed are vulnerable.

Read the full article at computerworld.com


Did you like this article?


0 Shares:
You May Also Like

Fiber Optic Table Illuminates Your Dining

Fiber Optic Table Illuminates Your Dining - Deepa writes "We highly doubt LumiGram's Luminous Fiber Optic Tablecloth was designed with power outages in mind, but why hook up a boring string of lamps or fiddle with half melted candles when you can plug this bad boy into the generator? The cloth, which has fiber optics woven throughout, cotton borders, and a Europlug mains adapter, proves most useful when the lights are dimmed, and should prove quite the centerpiece at your next get-together. The illuminating device is available in a trio of sizes, comes in a variety of color schemes."

Read more of this story at Slashdot.

[Slasdot]
Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More