RSS feed

Downclimb: Summit Route's Weekly Infosec News Recap
2014.10.10 – 2014.10.17:

Top stories

POODLE: Attack on SSLv3

In an attack similar to BEAST, this allows a MiTM attacker to subvert the legacy SSLv3. The recommended solution is to disable SSLv3. The impact of this is similar to Heartbleed, but whereas Heartbleed only needed to be fixed on servers, this requires clients to be updated. Unlike Heartbleed, however, no SSL certificates need to be revoked and renewed. All of the talk and recommendations for this are to help users fix their browsers, but this impacts anything that uses SSL, which is not just browsers. Many applications will use SSL/TLS when they want secure communications, such as chat clients that use XMPP, auto-updates, and mail clients. So these applications must also be updated.

Windows exploits

Patch Tuesday was busy with 3 big exploits that were found being exploited in the wild, in addition to more vulnerabilities.

(CVE-2014-4114) A design flaw in Microsoft Office products allows a fairly easy way of getting remote code execution without memory corruptions when a user opens a PowerPoint file. This exploit is being referred to as Sandworm. This is the type of exploit that EMET does nothing against, but which application white-listing can protect against.

(CVE-2014-4113) Crowdstrike and FireEye discuss a new privilege escalation vulnerability[2,3]. Crowdstrike discusses how they found it and how to detect it, and FireEye discusses how it works. Interestingly, they each seem to have acquired different samples that each use this exploit.

(CVE-2014-4148) FireEye also found an additional in-the-wild exploit using TrueType fonts (TTF)[3]. TTF exploits are especially dangerous because they can be exploited by having the victim visit a webpage and these exploits the kernel so no additional privilege escalation or sandbox escape is necessary.

(CVE-2014-4073) There is yet another privilege escalation, this time with .NET's use of DCOM[4,5]. Although Microsoft released a patch, the underlying issue apparently has not been fixed, and exploit code is available at [4].

The carnage on Windows isn't limited to what has been patched. The prolific vulernability researcher who goes by lcamtuf (Michal Zalewski), using his "american fuzzy lop" framework, found vulnerabilities in Firefox and IE[6]. The Firefox vuln was patched, but unfortunately, after 90 days, Microsoft failed to patch for this, so a proof-of-concept has been released.

  2. Crowdstrike write-up:
  3. FireEye write-up:
  4. .NET priv esc with exploit code:
  5. MS on the .net pric esc:

FinFisher Analysis

An in-depth analysis of FinFisher malware. I especially like write-ups like this because it shows the techniques and architectures used by the malware authors when they developed their software, instead of a lot of write-ups that just point out IOC's such as file hashes and what C&C servers are used.

Threat Intelligence

Throught-provoking article from Dave Aitel on the need to avoid having Threat Intelligence simply follow as a re-branding of AV signatures.

Docker coming to Windows

Docker for Windows will be demo'd on Oct 30[1]. It will be interesting to see how (or if) they securely isolate the Docker containers. This likely will be built on Microsoft's research project Drawbridge, which has been in development since 2011[2].


Certificate Authorities on mobile devices

Bluebox does a great job of pointing out historical issues with a variety of certificate authorities.

Conference materials and publications

Other reads