Home page logo
/

educause logo Educause Security Discussion mailing list archives

Re: 0-day exploit for Internet Explorer in the wild
From: Gregory N Pendergast/AC/VCU <gnpendergast () VCU EDU>
Date: Wed, 10 Dec 2008 10:28:34 -0500

BreakingPoint Labs has a good analysis of the exploit:
http://www.breakingpointsystems.com/community/blog/patch-tuesdays-and-drive-by-sundays

Unfortunately, I haven't yet seen any mention of realistic mitigations.

Greg Pendergast
Information Security Analyst
Virginia Commonwealth University






"Sabo, Eric" <Eric.Sabo () CUP EDU>
Sent by: The EDUCAUSE Security Constituent Group Listserv
<SECURITY () LISTSERV EDUCAUSE EDU>
12/10/2008 05:13 AM
Please respond to
The EDUCAUSE Security Constituent Group Listserv
<SECURITY () LISTSERV EDUCAUSE EDU>


To
SECURITY () LISTSERV EDUCAUSE EDU
cc

Subject
[SECURITY] 0-day exploit for Internet Explorer in the wild






SANS is reporting the following:
                 http://isc.sans.org/diary.html?storyid=5458

Does anyone have any additional information on this?

Eric Sabo
Senior Windows Systems Engineer
Department of Computing Systems
California University of Pennsylvania


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]