text
stringlengths
4
429
McAfee Remediation
Manager
Malware coverage is out of scope.
McAfee Policy Auditor SCAP
Out of scope
MNAC SCAP
Out of scope
Microsoft Internet Explorer DOM Operation Memory Corruption Vulnerability
Threat Identifier(s)
CVE-2010-0249
Threat Type
Vulnerability
Risk Assessment
High
Main Threat Vectors
E-Mail; Web
User Interaction Required
Description
A memory corruption vulnerability in some versions of Microsoft Internet
Explorer may lead to remote code execution or an application crash. The
flaw lies in Internet Explorer's handling of certain DOM operations.
Exploitation can occur via a maliciously crafted file or a maliciously crafted
web page and allow an attacker to execute arbitrary code. Failed exploit
attempts may result in an application crash (denial of service).
Importance
High. On January 14 Microsoft publicly disclosed this vulnerability. Active
exploitation has been observed in the wild.
McAfee Product Coverage *
DAT files
Coverage for known exploits and associated malware is provided as
Exploit-Comele, Roarur.dr, and Roarur.dll in the 5862 DATs, released
January 15.
VSE BOP
Generic buffer overflow protection is expected to cover some, but not all,
exploits.
Host IPS
Generic buffer overflow protection is expected to cover some, but not all,
exploits.
McAfee Network Security
Platform
Extended coverage is provided in the January 18 UDS release via the
signature "Microsoft Internet Explorer HTML DOM Memory
Corruption III." Coverage was originally provided in the UDS release of
January 14.
McAfee Vulnerability
Manager
The FSL/MVM package of January 14 includes a vulnerability check to
assess if your systems are at risk.
MNAC 2.x
Under analysis
McAfee Remediation
Manager
Remediation Manager provides mitigation for this issue by elevating
Internet Explorer settings in the Internet and Local Intranet zones. A
remedy for this issue will be provided upon release of an official vendor
patch.
Cleaning and Repair
A full on-demand scan must run to completely clean an infected host. In some cases, it
may also be necessary to run the on-demand scan in Safe Mode, as well as run a second
scan after a reboot. It is critical that the on-demand scan be configured properly.
The proper configuration:
Scan All Local Drives
Memory for Rootkits
Running Processes
Registry
First
Action
set to
Clean
The full, recommended process:
Launch a full on-demand scan with the prior-documented configuration
Allow the scan to run to completion
Reboot
Launch a second on-demand scan and allow it to run to completion to verify that
the system has been cleaned
Common URLs accessed
The following domains need to be blocked at the firewall:
360.homeunix.com
69.164.192.4
alt1.homelinux.com
amt1.homelinux.com
aop1.homelinux.com
app1.homelinux.com
blogspot.blogsite.org
filoups.info
ftp2.homeunix.com
ftpaccess.cc
google.homeunix.com
members.linode.com
sl1.homelinux.org
sl1.homelinux.org
tyuqwer.dyndns.org
update.ourhobby.com
voanews.ath.cx
webswan.33iqst.com:4000
yahoo.8866.org
ymail.ath.cx
yahooo.8866.org
sl1.homelinux.org
360.homeunix.com