Berkeley CSUA MOTD:Entry 31009
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/28 [General] UID:1000 Activity:popular
5/28    

2004/6/25-26 [Computer/SW/Security, Computer/SW/OS/Windows, Computer/SW/OS/OsX] UID:31009 Activity:high
6/24    Yay, IE6 vulnerability that affects fully patched systems, that
        allows local machine access (downloading and running any .exe) on
        previewing an e-mail or browsing a web site (including pop-up)!
        System administrators rejoice!
        http://csua.org/u/7xe
        \_ IE on mac os x not affected, supposedly. :-)
           \_ The payload is a Windows executable, but I wonder if the same
              IE hole doesn't exist on Macs too...
              \_ It's probably not as easy to execute arbitrary due to diff.
                 in underlying API.  Also the mac division of MS is complete
                 separate and semi-autonomous/forgotten from the rest.
        \_ But the report I read from the "Get the Facts" Roadshow said
           that Microsoft is the fastest at fixing security holes!
           \_ That's because their security holes are all the same.  They just
              keep on making the same mistakes over and over again.  Besides,
              how hard is it to fix a buffer overrun hole?
        \_ Infect yourself!  (with a "harmless" one)
           http://62.131.86.111/security/idiots/repro/installer.htm
           It overwrites C:\Program Files\Windows Media Player\wmplayer.exe
           and runs the new one, then restores it when it's done.
           \_ Gee, this sounds like GREAT advice.
           \_ Has no visible effect on safari.
              \_ sploit only affects IE, and probably only on Windows.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/28 [General] UID:1000 Activity:popular
5/28    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2008/2/1-7 [Computer/Companies/Google, Computer/SW/OS/Windows] UID:49047 Activity:kinda low
2/1     MS tries to buy Yahoo
        \_ GOOG 514.60  -49.70
           :-)
           I'm not the "short GOOG" guy, just someone who envies Google
           employees.
        \_ Official buyout letter from MSFT http://tinyurl.com/3ysrzu
	...
2007/4/13-16 [Computer/SW/WWW/Browsers] UID:46291 Activity:nil
4/13    I use IE7 to browse a web site, and the server says the UserAgent
        string is
        "UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.2; .NET
        CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)"
        Is MS bowing to the Mozilla community?
        \_ What are you talking about?  IE has always reported its UserAgent
	...
2006/2/10-13 [Computer/SW/WWW/Browsers] UID:41793 Activity:moderate
2/10    "Spyware Barely Touches Firefox"
        http://news.yahoo.com/s/cmp/20060210/tc_cmp/179102616
        "Internet Explorer users can be as much as 21 times more likely to end
        up with a spyware-infected PC than people who go online with Mozilla's
        Firefox browser, academic researchers from Microsoft's backyard said in
        a recently published paper."
	...
2004/7/13-14 [Computer/SW/WWW/Browsers] UID:32251 Activity:very high
7/12    In the news...
        "Continuing security problems have eroded Internet Explorer's
        popularity; the market share for Explorer has dropped by more than a
        percentage point from 95.48 percent to 94.42 percent..."
        Gee that's gotta hurt! Poor MS.
        \_ Although if you read a report that said non IE browsers have gained
	...
2003/8/27-28 [Computer/SW/WWW/Browsers, Computer/SW/OS/Windows, Computer/SW/Unix] UID:29484 Activity:low
8/27    This is a question for Imaging gurus.  I have a few JPEG
        files which I'm not able to view on my PC.  However, I am
        able to view the thumbnail of the pic in Windows Explorer
        in XP.  When I try to load it in 'xv' on unix I get the
        following errors.  The image is located at /csua/tmp/photo18.jpg.
        Is there any way to fix these JPEG errors?  Thanks for any
	...
2002/4/4-5 [Computer/SW/Languages/Web] UID:24317 Activity:very high
4/3     What is advantage/disadvantage of various server-side scripting?
        JSP, M$ ASP, PHP?
        \_ Next page of replies summarized: Your mileage may vary.
        \_ visit link:www.codecharge.com for a nifty tool.  Otherwise, PHP is my
           favorite since it has source, is designed from ground zero for
           web-pages, and is cross-platform.
	...
2002/3/10 [Computer/SW/OS/Windows, Computer/SW] UID:24069 Activity:moderate
3/9     http://www.microsoft.com/unix/ie/downloads/default.asp
        \_ What's your point?  MS did this 3 or 4 years ago when the
           browser wars were in full swing and they needed "Runs on UNIX"
           check boxes in the feature comparisons with Netscape.
           \_ The point is they kept the unix version relatively updated
              and didn't drop it after netscape keeled over at IE 4.x.
	...
2001/10/2 [Computer/SW/OS/Windows] UID:22623 Activity:nil
10/2    is there a way to download the service pack for IE 5/5.5
        and burn it to a CD?  I need to patch my mother's
        machine (i hear nimda is scary) , but she has a modem and I don't want
        to spend 9 hours on a phone line connecting to microsoft. - danh
        \_ An alternative is to zip the file to multiple diskettes.
          \_ no no you don't get it, to update IE 5/5.5, you download
	...
1999/2/16-18 [Computer/SW/OS/Windows] UID:15420 Activity:moderate
2/15    Windows Refund Day was fun, though it did not produce any refunds.
        You can see just what Microsoft had to say to us at
                http://zork.net/~schoen/dear-valued-customer.html
        and various press coverage and such, as it develops, at
                http://linuxmafia.com/refund
        Microsoft carefully declined to answer our questions on how to get the
	...
1997/3/4-5 [Computer/SW/OS/Windows] UID:32088 Activity:high
3/5     Can someone please tell me why Netscape 3.01 crashes so much
        more on my NT 4.0 than my Win95?
        \_ Insufficient RAM you have?
           \_ I have 32 megs, dude. Still, NT shouldn't be crashed.
           \_ Yoda, you are not. Speak like him, you should not. Weak with
              the force you are.
	...
1996/11/13 [Computer/SW/WWW/Browsers, Academia/GradSchool, Computer/SW/OS/Windows] UID:32000 Activity:nil
11/12   Okay, I'm a dork.  Where're we supposed to download MSIE to get
        MS to donate $1 to the tech museum?  --tabloyd
        \_ MS has a horrible web site for low bandwidth connections.  I
         wasted several hours trying to get it, and only eventually got a
         version that wouldn't install.  If anyone has IE 3.0 for 3.1,
         could I please get a copy?  (Didn't have these problems
	...
Cache (4612 bytes)
csua.org/u/7xe -> news.com.com/Researchers+warn+of+infectious+Web+sites/2100-7349_3-5247187.html?tag=nefd.top
update Security researchers warned Web surfers on Thursday to be on guard after uncovering evidence that widespread Web server compromises have turned corporate home pages into points of digital infection. The researchers believe that online organized crime groups are breaking into Web servers and surreptitiously inserting code that takes advantage of two flaws in Internet Explorer that Microsoft has not yet fixed. Those flaws allow the Web server to install a program that takes control of the user's computer. context What's new: Intruders are using compromised Web sites to infect visitors' PCs though two Internet Explorer flaws. This method of attack is increasingly being used by the Internet underground. While it's unknown how many Web sites carry the malicious program, Windows users should turn their IE security to the highest setting or install a third-party browser. increase their browser security to the highest settings, although that could cause some Web site functions to stop working. The extent of the attacks is unknown, but the security community has seen numerous cases of personal computers infected when the user merely visits a Web site. "It is not epidemic, but it is being seen," said Alfred Huger, senior director of engineering for security company Symantec. installed itself onto a victim's computer via the same two flaws in Internet Explorer. A large financial client called in Symantec in late April after an employee's system had been infected when he used Internet Explorer to browse an infected Web site. mass intrusion at Interland, said sources familiar with that case. This time, however, the flaws affect every user of Internet Explorer, because Microsoft has not yet released a patch. Moreover, the infectious Web sites are not just those of minor companies inhabiting the backwaters of the Web, but major companies, including some banks, said Brent Houlahan, chief technology officer of NetSec. "There are auction sites, price comparison sites and financial institutions." The Internet Storm Center, which monitors Net threats, confirmed that the list of infected sites included some large Web properties. "We won't list the sites that are reported to be infected in order to prevent further abuse, but the list is long and includes businesses that we presume would normally be keeping their sites fully patched," the group stated on its Web site. The group also pointed out that the malicious program uploaded to a victim's computer is not currently detected as a virus by most antivirus software. With no patch from Microsoft, that leaves Internet Explorer users vulnerable. A representative of the software giant was not immediately available for comment on when a patch might be available. Researchers believe that attackers seed the Web sites with malicious code by breaking into unsecured servers or by using a previously unknown vulnerability in Microsoft's Web software, Internet Information Server (IIS). When a victim browses the site, the code redirects them to one of two sites, most often to another server in Russia. That server uses the pair of Microsoft Internet Explorer vulnerabilities to upload and execute a remote access Trojan horse, RAT, to the victim's PC. The software records the victim's keystrokes and opens a back door in the system's security to allow the attacker to access the computer. Currently, researchers have two theories as to who is behind the attacks. "There is quite a bit of evidence that what we are seeing is yet another technique for spreading and installing 'spamware,'" the group stated on its site. "We don't see any evidence that this attack is related to the construction of a DDoS (distributed denial of service) network or other type of typical zombie-based attack group." However, Symantec believes that the attacks last fall and in April, which the current one most resembles, were conducted by online organized crime groups from Russia. The theory is supported not only by the fact that the server storing the malicious code is in Russia, but also by the sophisticated nature of the attacks, Symantec's Huger said. "It's a group of people that have resources to bring to play," he said, adding that the attack programs were not amateur material. Meanwhile, the average Internet surfer is left with few options. Besides choosing the highest security settings for Internet Explorer, Windows users could download an alternate browser, such as Mozilla or Opera. "I told my wife, unless it is absolutely necessary and unless you are going to a site like our banking site, stay off the Internet right now," he said.