
"Thierry Zoller has written a nice summary of the TLS & SSLv3 renegotiation vulnerability. He covers examples, impacts, solutions, and a conclusion. It can be found here: http://www.g-sec.lu/practicaltls.pdf. The ISC previously discussed the vulnerability here: http://isc.sans.org/diary.html?storyid=7534 and the OpenSSL update here: http://isc.sans.org/diary.html?storyid=7543." -from http://isc.sans.org/diary.html?storyid=7582
___
there is a lot of ownage going on with the recent acrobat reader vulns. like someone said in the channel.. they setup for fail when they turned an <3mb href="http://www.isohunt.com/">http://www.isohunt.com
"WARNING: DO NOT OPEN ANY UNTRUSTED PDF FILES DOWNLOADED TO YOUR COMPUTER. (especially those that start downloading without your interaction) There currently is a 0-day (unpatched) flaw being exploited "in the wild" (this means on isohunt.com). We will try our hardest to filter out advertisers that are showing these bad advertisements, but we're not perfect. So, again, DO NOT OPEN, VIEW OR DOWNLOAD ANY PDF FILES that 'automatically' pop up.
Thanks
In the meantime, firewaling 193.104.22.0/24 and at least 89.149.236.46 as well will "help" mitigate the effects of these bad ads. 193.104.22.0/24 has been involved in more than just today's problems. We are in contact with our advertisers about these bad ads.
If you'd like to read more about the PDF exploit (and why you should disable pdf plugins immediately):
http://isc.sans.org/diary.html?storyid=7747
http://extraexploit.blogspot.com/search/label/CVE-2009-4324"
http://www.us-cert.gov/current/
the anti-sec exposed zine that is getting so much hype has had its pastebins removed/expired, i updated below. you can find their shit at http://www.anti-sec.com
No comments:
Post a Comment