Remote flaw found in Vista existed since December 2006

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
http://blogs.zdnet.com/security/?p=143

A private security research outfit says it notified Microsoft about the animated cursor (.ani) code execution vulnerability since December 2006, a full four months ahead of yesterday?s discovery of Internet Explorer drive-by attacks.

According to Alexander Sotirov, chief reverse engineer at Determina, his research team discovered and reported the flaw to Microsoft last December. On January 3, 2007, Microsoft reserved CVE-2007-0038 to use in its security bulletin.

So far this year, Microsoft has shipped 16 bulletins to fix a wide swathe of software vulnerabilities, but the animated cursor bug remains unpatched.

A Redmond spokesman confirmed that Determina responsibly disclosed the details of this flaw since last year. ?We have been working with Determina since their report in December to investigate the issue and develop a comprehensive update to address the issue,? the spokesman said.

So, why has it taken so long to provide protection to Windows users? Microsoft explains:

Creating security updates that effectively fix vulnerabilities is an extensive process involving a series of sequential steps. There are many factors that impact the length of time between the discovery of a vulnerability and the release of a security update, and every vulnerability presents its own unique challenges. When a potential vulnerability is reported, designated product specific security experts investigate the scope and impact of a threat on the affected product. Once the ****** knows the extent and the severity of the vulnerability, they work to develop an update for every supported version affected. Once the update is built, it must be tested with the different operating systems and applications it affects, then localized for many markets and languages across the globe.

Meanwhile, Determina warns that the vulnerability is ?trivially exploitable on all versions of Windows, including Vista.

The protected mode of IE7 will lessen the impact of the vulnerability, but shellcode execution is of course still possible. Determina also discovered
that under certain circumstances Mozilla Firefox uses the same underlying Windows code for processing ANI files, and can be exploited similarly to Internet Explorer.

This is a fast-moving story with multiple angles. Here are some important things to pay attention to:

** eEye Digital Security, a research firm that found an almost identical bug in 2005 (see MS05-002), is offering a free third-party patch. eEye?s interim patch comes with source code. This patch is buyer-beware so use at your own risk.

** The only workaround guidance from Microsoft is to read e-mail messages in plain text format if you are using Outlook 2002 or a later version, or Windows Mail to help protect yourself from the HTML e-mail preview attack vector. However, reading e-mail in plain text on Windows Vista Mail does not mitigate attempts to exploit the vulnerability when Forwarding and Replying to mail sent by an attacker.

** For Users of Outlook Express, using plain text is not an effective mitigation and users should be extremely careful when reading mail from untrusted or malicious sources.

** In addition to IE, e-mail is a nasty attack vector because an attack can be launched silently if the target simply opens a specially crafted HTML message. However, users of Outlook 2007 are at not at risk from the HTML or Preview Pane attack vectors when using Word as their default editor or reading e-mail in plain text. Users of Outlook 2002 (with Office XP Service Pack 1 or a later version) and Outlook 2003 can enable the setting to read mail as plain text to successfully mitigate against attacks using the HTML or Preview Pane attack vectors.

** Mark Miller, director of the ****** (Microsoft Security Response Center) tells me the in-the-wild attacks are still ?very limited and targeted? but this could change quickly because exploit code that gives attackers a roadmap to exploit the flaw is publicly available. If the attacks escalate, Microsoft will consider an out-of-band emergency patch.

** This vulnerability does affect Windows Vista. However, Miller believes there are several mitigations that will reduce the risk for Vista users. These include Internet Explorer 7 in Protected Mode and UAC (User Account Control) which gives the user a pop-up warning ahead of an exploit. This is the first in-the-wild exploit that?s available for Windows Vista.

** The SANS Internet Storm Center has published a list of hostile domains hosting drive-by exploits.

** WebSense and others have found frightening similarities to the Super Bowl Web site breach earlier this year. This highlights just how widespread this could become if certain high-traffic sites or advertising networks are hijacked and seeded with

Looks like this vulnerability has been around for SEVERAL months! So, what do you Vista users have to say now, huh? Looks like all that cockiness has finally caught up to all of you.


http://www.cbc.ca/technology/story/2007...edcursorflaw-20070330.html#skip300x250

A security flaw in Microsoft Corp.'s Windows software that leaves computers vulnerable to hijack is linked to February's attack on the website of Super Bowl host Dolphin Stadium, researchers say.

In an advisory issued by Microsoft Thursday, the world's largest software maker said it had confirmed that multiple versions of Windows ? including the latest Vista version ? contain a flaw in the way the operating system handles animated cursors or pointers.

The animated cursor files end with the filename extension ".ani" and are sometimes used by software such as Microsoft's Office suite and by website developers to enhance or modify the experience of using the computer. The vulnerability could allow an attacker to take control of a computer.

WINDOWS VERSIONS AFFECTED

Vista

2000 SP4

XP SP2

XP 64-bit v. 2003 for Itanium systems

XP Professional x64

Server 2003

Server 2003 (Itanium)

Server 2003 SP1

Server 2003 SP1 (Itanium)

Server 2003 x64

"In order for this attack to be carried out, a user must either visit a website that contains a web page that is used to exploit the vulnerability or view a specially crafted e-mail message or e-mail attachment sent to them by an attacker," Microsoft researcher Adrian Stone wrote in a post to the company's security blog.

The company noted that it has added the ability to detect the flaw to its Windows Live OneCare security software suite and plans to issue a security update for the operating system.

Security software maker McAfee Inc. researcher Craig Schmugar noted in a post to the company's Avert Labs blog Thursday that an attack on the Dolphin Stadium website in February used the same computer script that is now being used to exploit the animated cursor flaw.

The script that was embedded in the Dolphin Stadium web page ? and thousands of others ? downloaded spyware from a server registered in China, giving attackers full access to a victim's computer.

That sucks. Oh well. I don't use Windows anyway.
 

loup garou

Lifer
Feb 17, 2000
35,132
1
81
Vista is protected from this as long as IE7 protected mode isn't turned off (it's turned on by default).

PS, you should probably remove Windows from your sig if you don't run it anymore.

PPS, try to contain your raging boner during the week of Vista bugs next week. Too bad they couldn't pull off a month's worth like OS X. We'll see what they come up with though.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Originally posted by: loup garou
Vista is protected from this as long as IE7 protected mode isn't turned off (it's turned on by default).

PS, you should probably remove Windows from your sig if you don't run it anymore.

PPS, try to contain your raging boner during the week of Vista bugs next week. Too bad they couldn't pull off a month's worth like OS X. We'll see what they come up with though.

I just realized it was still in my sig... Hmm... I better change that then. Haven't had Windows for a full year now.

Anyway, this is not protected by IE's protected mode because the attacker gets remote access to the entire PC. This means they control your box. Read the article, dude. They get remote control! So, that means that they get to install programs and etc. Some serious stuff, dude.
 

loup garou

Lifer
Feb 17, 2000
35,132
1
81
Originally posted by: Quinton McLeod
Originally posted by: loup garou
Vista is protected from this as long as IE7 protected mode isn't turned off (it's turned on by default).

PS, you should probably remove Windows from your sig if you don't run it anymore.

PPS, try to contain your raging boner during the week of Vista bugs next week. Too bad they couldn't pull off a month's worth like OS X. We'll see what they come up with though.

I just realized it was still in my sig... Hmm... I better change that then. Haven't had Windows for a full year now.

Anyway, this is not protected by IE's protected mode because the attacker gets remote access to the entire PC. This means they control your box. Read the article, dude. They get remote control! So, that means that they get to install programs and etc. Some serious stuff, dude.
And here's some reading for you:
Text

Text

OMG even the Register! Last line...see if you can make it past all the bashing in the rest of the article without salivating all over your keyboard.

Now of course, some doofus could go through a whole lot of trouble disabling security features in IE7 and downloading attachments and opening HTML mail from senders he's never heard of and get himself pwned....but at least get your facts straight.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Originally posted by: loup garou
Originally posted by: Quinton McLeod
Originally posted by: loup garou
Vista is protected from this as long as IE7 protected mode isn't turned off (it's turned on by default).

PS, you should probably remove Windows from your sig if you don't run it anymore.

PPS, try to contain your raging boner during the week of Vista bugs next week. Too bad they couldn't pull off a month's worth like OS X. We'll see what they come up with though.

I just realized it was still in my sig... Hmm... I better change that then. Haven't had Windows for a full year now.

Anyway, this is not protected by IE's protected mode because the attacker gets remote access to the entire PC. This means they control your box. Read the article, dude. They get remote control! So, that means that they get to install programs and etc. Some serious stuff, dude.
And here's some reading for you:
Text

Text

OMG even the Register! Last line...see if you can make it past all the bashing in the rest of the article without salivating all over your keyboard.

Now of course, some doofus could go through a whole lot of trouble disabling security features in IE7 and downloading attachments and opening HTML mail from senders he's never heard of and get himself pwned....but at least get your facts straight.


What makes this funny is that you Windows users deny vulnerabilities when they are staring you right in the face. You don't just stand up and say, "Oh, it doesn't affect us.". Yes it does! The vulnerability is still there and just because IE is in a "sandbox" doesn't mean you won't feel its affects. That's foolish thinking.

When such a threat is posed in Linux (or even on Firefox), despite its threat level, it is fixed immediately. This cockiness among you Windows users will be the end of you sooner or later.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
Anyway, this is not protected by IE's protected mode because the attacker gets remote access to the entire PC.

No, the attack lets the remote site run code with priviledges of the user running the browser and if they're using IE7 in protected mode that's very limited access. And also if you're using Outlook configured to use Word as it's email editor (which is the default in O2K7 it seems) that attack vector won't work since IE won't be used to render email anymore.

What makes this funny is that you Windows users deny vulnerabilities when they are staring you right in the face.

No, what makes this funny is that you come running in there screaming about how bad the vulnerability is without understanding how it works and what it's limitations really are.
 

MedicBob

Diamond Member
Nov 29, 2001
4,151
1
0
WOW. Now I like and use Linux but to say all Windows users are denying problems in their choice of OS is immature. Quinton McLeod stop acting like just because you use Unbuntu that you are much more L33T then those using Windows.

As Nothinman posted, read and understand the article. Ask questions if something doesn't make sense. Oh, and BTW all Unix and *Nix vulnerabilities are not patched immediately. Some take weeks and hundreds of hours to patch just like, GASP, Microsofts OSes.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Blah blah blah. You people are so disillusioned from reality. If any of you would actually see what this vulnerability actually does, then you wouldn't be saying the things you're saying now.

Take a look at this:

http://www.youtube.com/watch?v=hf0S0Vk7j6I

If you don't think this will affect you, then you're all just a bunch of mindless Windows drones.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Originally posted by: MedicBob
WOW. Now I like and use Linux but to say all Windows users are denying problems in their choice of OS is immature. Quinton McLeod stop acting like just because you use Unbuntu that you are much more L33T then those using Windows.

As Nothinman posted, read and understand the article. Ask questions if something doesn't make sense. Oh, and BTW all Unix and *Nix vulnerabilities are not patched immediately. Some take weeks and hundreds of hours to patch just like, GASP, Microsofts OSes.

lol
Name one single remote vulnerability that has not been patched on any *nix that is still supported today.

I never said I was l33t. However, you have no proof that windows users don't deny their problems. In fact, you had to result to bashing me because you couldn't find enough information to support your original claim.

I rest my case
 

lxskllr

No Lifer
Nov 30, 2004
57,889
8,156
126
Originally posted by: Quinton McLeod

If you don't think this will affect you, then you're all just a bunch of mindless Windows drones.

Yea, Nothinman's well known around here for being a Windows drone
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: Quinton McLeod
Originally posted by: MedicBob
WOW. Now I like and use Linux but to say all Windows users are denying problems in their choice of OS is immature. Quinton McLeod stop acting like just because you use Unbuntu that you are much more L33T then those using Windows.

As Nothinman posted, read and understand the article. Ask questions if something doesn't make sense. Oh, and BTW all Unix and *Nix vulnerabilities are not patched immediately. Some take weeks and hundreds of hours to patch just like, GASP, Microsofts OSes.

lol
Name one single remote vulnerability that has not been patched on any *nix that is still supported today.

I never said I was l33t. However, you have no proof that windows users don't deny their problems. In fact, you had to result to bashing me because you couldn't find enough information to support your original claim.

I rest my case

Wasn't the ani issue released yesterday?
 

MedicBob

Diamond Member
Nov 29, 2001
4,151
1
0
Originally posted by: Quinton McLeod
Originally posted by: MedicBob
WOW. Now I like and use Linux but to say all Windows users are denying problems in their choice of OS is immature. Quinton McLeod stop acting like just because you use Unbuntu that you are much more L33T then those using Windows.

As Nothinman posted, read and understand the article. Ask questions if something doesn't make sense. Oh, and BTW all Unix and *Nix vulnerabilities are not patched immediately. Some take weeks and hundreds of hours to patch just like, GASP, Microsofts OSes.

lol
Name one single remote vulnerability that has not been patched on any *nix that is still supported today.

I never said I was l33t. However, you have no proof that windows users don't deny their problems. In fact, you had to result to bashing me because you couldn't find enough information to support your original claim.

I rest my case

Sorry if I came off as bashing you, it wasn't my intent. Find me proof that all MS Windows users deny their OS problems and I will retract my statements. BTW, I use Windows as well as Linux and Solaris. I agree Windows in all flavors has problems, but so does every other major software package, to assume it doesn't is foolish.

 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Apple let their customers remain vulnerable for 30+ days because of the month of apple bugs. They still deny that Maynor and Cache are geniuses.

http://secunia.com/advisories/23178/

There are a number of issues with the Linux 2.6 kernels, including plenty of remote DoSes.

http://secunia.com/advisories/24120/ It's patched, but still...

Hell, even OpenBSD's had a remote root vulnerability recently. Vulnerabilities happen. This one has gotten enough press that it'll be patched soon (if you don't want to use a 3rd party patch). Don't worry.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Tell me n0cMonkey. How many of those *nix vulnerabilities have actually been exploited?
This ani "exploit" has been around since February. Here it is, the end of March, and it has not been patched until recently.
Hackers all over the place are abusing this vulnerability like nobody's business.

As far as the Apple thing. From what I understand, those two guys have been bickering and fighting about a vulnerability that more or less does or does not exist. The rest of Apple and the world have yet to validate the claims both of them are making on their blogs.

You also have not been able to find any vulnerabilities that have not been patched yet. I'm not arguing that OSes can't get vulnerabilities, but I'll tell you this, Microsoft was touting that Vista was more secure than Linux. I look at this news and just laugh.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Originally posted by: MedicBob
Originally posted by: Quinton McLeod
Originally posted by: MedicBob
WOW. Now I like and use Linux but to say all Windows users are denying problems in their choice of OS is immature. Quinton McLeod stop acting like just because you use Unbuntu that you are much more L33T then those using Windows.

As Nothinman posted, read and understand the article. Ask questions if something doesn't make sense. Oh, and BTW all Unix and *Nix vulnerabilities are not patched immediately. Some take weeks and hundreds of hours to patch just like, GASP, Microsofts OSes.

lol
Name one single remote vulnerability that has not been patched on any *nix that is still supported today.

I never said I was l33t. However, you have no proof that windows users don't deny their problems. In fact, you had to result to bashing me because you couldn't find enough information to support your original claim.

I rest my case

Sorry if I came off as bashing you, it wasn't my intent. Find me proof that all MS Windows users deny their OS problems and I will retract my statements. BTW, I use Windows as well as Linux and Solaris. I agree Windows in all flavors has problems, but so does every other major software package, to assume it doesn't is foolish.

Read the Operating Systems forum. How many people actually release Windows vulnerability news here? Close to null. That's proof enough right there.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Originally posted by: fyleow
If you prefer to run Firefox instead of Internet Explorer but want protected mode you still can. Firefox defaults to a medium integrity level but you can set it so it runs at low. That should protect you from attacks like these.

More info from Joanna Rutkowska's blog here

Basically:

If you don?t like surfing using IE, you can very easily setup your Firefox (or other browser of your choice) to run as Low integrity process (here we assume that Firefox user?s profile is in j:\config\firefox-profile):

C:\Program Files\Mozilla Firefox>icacls firefox.exe /setintegritylevel low
J:\config>icacls firefox-profile /setintegritylevel (OI)(CI)low

True, but Firefox isn't a Windows only application. IE7 is.
 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
As far as the Apple thing. From what I understand, those two guys have been bickering and fighting about a vulnerability that more or less does or does not exist. The rest of Apple and the world have yet to validate the claims both of them are making on their blogs.
Actually, the vulnerabilities do exist, and Apple patched them. They just didn't give Maynor and Ellch (Cache) any credit. Guess they were patching some other wireless vulnerabilities.
http://secunia.com/advisories/22068/

Then there's the whole issue of Apple creating the scandal in the first place, by orchestrating an attack against Maynor and Ellch.
http://blogs.zdnet.com/Ou/?p=451

Which led to the MOAB, resulting in 62 separate vulnerabilities in 2007.

But hey, Apple can do no wrong, and those Apple vs PC ads must be right. So keep your fantasy going.
 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
Blah blah blah. You people are so disillusioned from reality. If any of you would actually see what this vulnerability actually does, then you wouldn't be saying the things you're saying now.
Gee, I wonder how that file got there?

:roll:
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Looks like Microsoft even admitted that this vulnerability is on the rise as more hackers are deciding to use it.

http://seattlepi.nwsource.com/local/6420AP_WA_Microsoft_Vulnerability.html

Microsoft says attacks on newly disclosed Windows flaw rise

By JESSICA MINTZ
AP BUSINESS WRITER

SEATTLE -- Hackers stepped up attacks Friday on computers running some versions of Windows, a day after Microsoft disclosed a hole related to the mouse cursor.

Microsoft Corp. sent out a security advisory Thursday warning customers that a vulnerability in ".ani" files - used to change the cursor into an hourglass while a program works, or into a dancing animal or other animation on specially designed Web sites - was allowing hackers to break into computers and install malicious software.

"Overnight we did see the attacks change from limited and targeted attacks to slightly more, but do still categorize it as a limited attack," said Mark Miller, director of the software maker's security response group.

The so-called zero-day attack, a vulnerability that is discovered before Microsoft has a chance to fix the problem, is aimed at PCs running Windows Vista, the new operating system the company has touted as its most secure. The hole has also been found on Windows 2000 Service Pack 4, Windows XP Service Pack 2 and some versions of Windows Server 2003.

Once hackers have access to a computer, they can install any number of nasty programs - ones that steal passwords or record keystrokes, which the hackers could then sell to identity thieves.

Microsoft first learned of the vulnerability in December, and has been working on a patch since, Miller said. He did not say whether it would be distributed on its own or as part of a scheduled update.

On Wednesday, security software vendor McAfee Inc. saw a post on a Chinese message board indicating hackers were planning to exploit the hole, which set Microsoft's security advisory in motion.

"It is important to note that while we do think Vista is most secure operating system released, no software is 100 percent secure," Miller said.

Computer users could end up with a malicious program on their PC after a Web browsing session and not know it, said Craig Schmugar, a virus researcher for McAfee Avert Labs, the research arm of McAfee.

So far, he said, attacks have been limited to Web surfing with Internet Explorer versions 6 or 7. Firefox, the open-source browser from Mozilla, does not yet seem vulnerable. While Microsoft urged people to be extremely cautious with e-mail, security companies said they have not seen any instances of attacks via e-mail.

While it's hard to tell what hackers will do once they have access to a computer, a group of Chinese hackers may be plotting to steal login information for the wildly popular multi-player video game, World of Warcraft. People who buy the stolen login information can profit by selling items inside the game world, said Ken Dunham, director of the rapid response team at iDefense, the research division of VeriSign Inc.

Dunham said his team learned of the plan on a Chinese hacker message board.
 

mechBgon

Super Moderator<br>Elite Member
Oct 31, 1999
30,699
1
0
Originally posted by: Quinton McLeod
Blah blah blah. You people are so disillusioned from reality. If any of you would actually see what this vulnerability actually does, then you wouldn't be saying the things you're saying now.

Take a look at this:

http://www.youtube.com/watch?v=hf0S0Vk7j6I
What you don't seem to comprehend is that the security researcher manually dragged & dropped an ANI file onto his desktop. Last I checked, there's no way for the bad guys to do that remotely
If you don't think this will affect you, then you're all just a bunch of mindless Windows drones.
Ironically, both my WinXP Pro and Windows Vista installations are immune to the effects of this exploit, with or without antivirus protection, thanks to my using some of Windows' built-in security capabilities (non-Admin accounts and disallowed-by-default Software Restriction Policy, not to mention IE7 Protected Mode on Vista). And of course my antivirus software detects the exploit, too.

So nope, I don't think it will affect me. I wouldn't mind wading straight into an exploit-bearing site with IE7 on either OS in order to capture samples, so if you can back up your lurid claim that "hackers all over the place are abusing this vulnerability like nobody's business," then give me some live links to check out.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: Quinton McLeod
Tell me n0cMonkey. How many of those *nix vulnerabilities have actually been exploited?
This ani "exploit" has been around since February. Here it is, the end of March, and it has not been patched until recently.
Hackers all over the place are abusing this vulnerability like nobody's business.

You didn't ask for things that have been exploited a lot, you asked for vulnerabilities. You want to talk about ****** open source stuff? Let's talk the pile that is PHP.

As far as the Apple thing. From what I understand, those two guys have been bickering and fighting about a vulnerability that more or less does or does not exist. The rest of Apple and the world have yet to validate the claims both of them are making on their blogs.

It does exist, and plenty of info has been released including information on the black bag job Apple's PR group did.

You also have not been able to find any vulnerabilities that have not been patched yet.

Yes, I did. I ****** the links, but you're a big boy you can figure it out (I sure as hell can't edit it :|).

I'm not arguing that OSes can't get vulnerabilities, but I'll tell you this, Microsoft was touting that Vista was more secure than Linux. I look at this news and just laugh.

Microsoft has come a long way. They deserve credit for the work they've done, regardless of the marketing team. Apple on the other hand...
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: mechBgon
Originally posted by: Quinton McLeod
Blah blah blah. You people are so disillusioned from reality. If any of you would actually see what this vulnerability actually does, then you wouldn't be saying the things you're saying now.

Take a look at this:

http://www.youtube.com/watch?v=hf0S0Vk7j6I
What you don't seem to comprehend is that the security researcher manually dragged & dropped an ANI file onto his desktop. Last I checked, there's no way for the bad guys to do that remotely
If you don't think this will affect you, then you're all just a bunch of mindless Windows drones.
Ironically, both my WinXP Pro and Windows Vista installations are immune to the effects of this exploit, with or without antivirus protection, thanks to my using some of Windows' built-in security capabilities (non-Admin accounts and disallowed-by-default Software Restriction Policy, not to mention IE7 Protected Mode on Vista). And of course my antivirus software detects the exploit, too.

So nope, I don't think it will affect me. I wouldn't mind wading straight into an exploit-bearing site with IE7 on either OS in order to capture samples, so if you can back up your lurid claim that "hackers all over the place are abusing this vulnerability like nobody's business," then give me some live links to check out.

It's been seen in the wild. No doubt it's been in phishing kits for a while.
 

Quinton McLeod

Senior member
Jan 17, 2006
375
0
0
Originally posted by: mechBgon
Originally posted by: Quinton McLeod
Blah blah blah. You people are so disillusioned from reality. If any of you would actually see what this vulnerability actually does, then you wouldn't be saying the things you're saying now.

Take a look at this:

http://www.youtube.com/watch?v=hf0S0Vk7j6I
What you don't seem to comprehend is that the security researcher manually dragged & dropped an ANI file onto his desktop. Last I checked, there's no way for the bad guys to do that remotely
If you don't think this will affect you, then you're all just a bunch of mindless Windows drones.
Ironically, both my WinXP Pro and Windows Vista installations are immune to the effects of this exploit, with or without antivirus protection, thanks to my using some of Windows' built-in security capabilities (non-Admin accounts and disallowed-by-default Software Restriction Policy, not to mention IE7 Protected Mode on Vista). And of course my antivirus software detects the exploit, too.

So nope, I don't think it will affect me. I wouldn't mind wading straight into an exploit-bearing site with IE7 on either OS in order to capture samples, so if you can back up your lurid claim that "hackers all over the place are abusing this vulnerability like nobody's business," then give me some live links to check out.

lol
Check out the link above your post and you will see the proof.

I finally understand why you Windows users are so disillusioned. YOU KNOW NOTHING ABOUT SECURITY lol.

And this cockiness is exactly what I was talking about. You feel you're so invicible but yet these things happen.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |