text
stringlengths 4
429
|
---|
McAfee Remediation
|
Manager
|
Malware coverage is out of scope.
|
McAfee Policy Auditor SCAP
|
Out of scope
|
MNAC SCAP
|
Out of scope
|
Microsoft Internet Explorer DOM Operation Memory Corruption Vulnerability
|
Threat Identifier(s)
|
CVE-2010-0249
|
Threat Type
|
Vulnerability
|
Risk Assessment
|
High
|
Main Threat Vectors
|
E-Mail; Web
|
User Interaction Required
|
Description
|
A memory corruption vulnerability in some versions of Microsoft Internet
|
Explorer may lead to remote code execution or an application crash. The
|
flaw lies in Internet Explorer's handling of certain DOM operations.
|
Exploitation can occur via a maliciously crafted file or a maliciously crafted
|
web page and allow an attacker to execute arbitrary code. Failed exploit
|
attempts may result in an application crash (denial of service).
|
Importance
|
High. On January 14 Microsoft publicly disclosed this vulnerability. Active
|
exploitation has been observed in the wild.
|
McAfee Product Coverage *
|
DAT files
|
Coverage for known exploits and associated malware is provided as
|
Exploit-Comele, Roarur.dr, and Roarur.dll in the 5862 DATs, released
|
January 15.
|
VSE BOP
|
Generic buffer overflow protection is expected to cover some, but not all,
|
exploits.
|
Host IPS
|
Generic buffer overflow protection is expected to cover some, but not all,
|
exploits.
|
McAfee Network Security
|
Platform
|
Extended coverage is provided in the January 18 UDS release via the
|
signature "Microsoft Internet Explorer HTML DOM Memory
|
Corruption III." Coverage was originally provided in the UDS release of
|
January 14.
|
McAfee Vulnerability
|
Manager
|
The FSL/MVM package of January 14 includes a vulnerability check to
|
assess if your systems are at risk.
|
MNAC 2.x
|
Under analysis
|
McAfee Remediation
|
Manager
|
Remediation Manager provides mitigation for this issue by elevating
|
Internet Explorer settings in the Internet and Local Intranet zones. A
|
remedy for this issue will be provided upon release of an official vendor
|
patch.
|
Cleaning and Repair
|
A full on-demand scan must run to completely clean an infected host. In some cases, it
|
may also be necessary to run the on-demand scan in Safe Mode, as well as run a second
|
scan after a reboot. It is critical that the on-demand scan be configured properly.
|
The proper configuration:
|
Scan All Local Drives
|
Memory for Rootkits
|
Running Processes
|
Registry
|
First
|
Action
|
set to
|
Clean
|
The full, recommended process:
|
Launch a full on-demand scan with the prior-documented configuration
|
Allow the scan to run to completion
|
Reboot
|
Launch a second on-demand scan and allow it to run to completion to verify that
|
the system has been cleaned
|
Common URLs accessed
|
The following domains need to be blocked at the firewall:
|
360.homeunix.com
|
69.164.192.4
|
alt1.homelinux.com
|
amt1.homelinux.com
|
aop1.homelinux.com
|
app1.homelinux.com
|
blogspot.blogsite.org
|
filoups.info
|
ftp2.homeunix.com
|
ftpaccess.cc
|
google.homeunix.com
|
members.linode.com
|
sl1.homelinux.org
|
sl1.homelinux.org
|
tyuqwer.dyndns.org
|
update.ourhobby.com
|
voanews.ath.cx
|
webswan.33iqst.com:4000
|
yahoo.8866.org
|
ymail.ath.cx
|
yahooo.8866.org
|
sl1.homelinux.org
|
360.homeunix.com
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.