BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

Posted March 15, 2012    Sarah Lieber

Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick.

Additionally, find this month’s Security Bulletin here, a list of all the Audit IDs here, and the PDF of the presentation here.  If you have additional questions not listed here, please feel free to comment below and we’ll get our Research Team to answer.

LIVE Q&A

During the webinar there were some great questions brought up that we wanted to get answered immediately. Below are the live audience questions and our Research Team’s answers:

Q: Which one is more vulnerable to attacks – .com or .net sites and client computers attached to them?

DJ: Both are equally vulnerable. The domain extension, in this case, does not have a whole lot of significance.

JD: It’s not the name or location of the site that makes it vulnerable, it’s the content.

Q: Are the article sources available?

DJ: Yes they’re available and below.

CTx:

IT Admin:

Researcher:

Q: Is the kill switch only controllable by MS or are admins able to adminstrate that functionality?

DJ: Details are scarce, but from all appearances Microsoft has sole control over that, seeing as the applications come from their app store.

JD: My best guess is probably not, this isn’t something you normally pass around.  It will likely be kept as a last resort case for Microsoft.  Killswitches in the past are known for being very rarely, if ever, used.

Q: There seems to be a security update that’s in Microsoft’s update list but does not seem to have an associated bulletin number. Because of that, I’m having difficulty finding out more information about it. It’s KB2647518, Update Rollup for ActiveX Killbits for Windows 7 for x64-based Systems. There’s an Advisory for this at http://support.microsoft.com/kb/2647518, and that page (that has various downloads and installation instructions) references a page with what I’d expect to be the usual descriptive bulletin info at http://www.microsoft.com/technet/security/advisory/2647518.mspx, but this page doesn’t exist. Scanning this month’s list of bulletins, it’s not immediately apparent whether this is a patch without a bulletin number assigned to it, or if it may be included in one of the bulletins that were published this month. Do you have a handle on this? If so, what’s up?

JD: This is a security update, but did not warrant a Bulletin.  Try http://support.microsoft.com/kb/2647518 instead for the advisory.  It basically just disables some ActiveX controls in third party software.

Tags:
, , , , ,

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,