Critical vulnerability in Firefox 3.5 and Firefox 3.6

5.11.10 – 09:50am

Firefox updates and patches are now complete. Just opening Firefox will update these vulnerabilities and update for you automatically.

26.10.10 – 02:30pm

Issue:
Mozilla is aware of a critical vulnerability affecting Firefox 3.5 and Firefox 3.6 users. We have received reports from several security research firms that exploit code leveraging this vulnerability has been detected in the wild.

Impact to users:
Users who visited an infected site could have been affected by the malware through the vulnerability. The trojan was initially reported as live on the Nobel Peace Prize site, and that specific site is now being blocked by Firefox’s built-in malware protection. However, the exploit code could still be live on other websites.

Status:
We have diagnosed the issue and are currently developing a fix, which will be pushed out to Firefox users as soon as the fix has been properly tested.

In the meantime, users can protect themselves by doing either of the following:

Credit:
Morten Kråkvik of Telenor SOC

Microsoft is due to issue its biggest ever Patch Tuesday, with 16 bulletins set to be addressed.

Microsoft has planned its biggest ever Patch Tuesday for October, with a total of 49 vulnerabilities set to be fixed.

This is over three times the number of security holes fixed in last month’s Patch Tuesday.

Of the 16 bulletins, four have been rated critical, where the flaws could lead to remote code execution. These four affected all versions of Windows.

One of the critical vulnerabilities affects Internet Explorer versions 6, 7 and 8, whilst two of the flaws, classed as “important,” affected Microsoft Office – one for Word and one for Excel on all platforms.

This Patch Tuesday announcement also marked the first time Microsoft Word 2010 had been included in an advisory.

The vulnerabilities are due to be patched on 12 October.

Why did Netregistry go down on the 28th Sep 2010??

The loose-knit confederation of internet activists who organise under the banner “Anonymous” appeared to hit Australia again this morning, with Operation Payback targeting a distributed denial of service (DDoS) attack against the Australian Federation Against Copyright Theft (AFACT).

AFACT represents a number of content producers such as movie and television studios and aims to reduce the impact of copyright infringement in Australia. The group has been involved in a high-profile lawsuit against national broadband provider iiNet. DDoS attacks attempt to cripple internet infrastructure through delivering a flood of data to servers and network infrastructure.

“Realise, you are forcing our hand by ignoring us. You forced us to DDoS when you ignored the people, ATTACKED the people, LIED TO THE PEOPLE! You are forcing us to take more drastic action as you ignore us, THE PEOPLE, now,” an individual claiming to represent Anonymous stated in a letter released before the attacks.

Anonymous is well known in Australia’s technology sector for what appeared to be several similar DDoS attacks earlier this year against Federal Government websites and other communications systems in protest against Labor’s mandatory internet filtering policy.

Three and half hours after the attacks were timed to begin on the AFACT site, AFACT and hosting partner Netregistry experienced the effects – with the copyright group’s site going down at 8AM this morning. This story was broken, to our knowledge, by iTNews.

“The attack consisted of 60,000 active HTTP connections and an approximate 100 megabits per second of additional bandwidth being transferred from this particular cluster where the site was located,” a Netregistry spokesperson said, adding that the attacks mainly originated from Chile and Columbia.

“The AFACT website was offline due to Netregistry engineers suspending it as the target of the attack. All other sites on the shared infrastructure remained operational, albeit with some service degradation,” they added. Anonymous had planned to attack AFACT for at least 12 hours.

“We’re delighted to say our infrastructure proved to be highly resilient in the face of a particularly heavy and determined DDoS attack. All affected websites remained online and were back to full performance reasonably quickly, only experiencing intermittent connection problems throughout the day,” said Netregistry chief executive Larry Bloch.

“Of course, the very nature of a DDoS attack means prevention is impossible. However, a combination of our cloud hosting infrastructure and active management dramatically reduced the potential impact for thousands of affected businesses.”

“This incident vindicates our multi-million dollar ten year investment in our shared cloud hosting infrastructure. It is remarkable that a shared cloud hosting service costing our clients around $10 per month withstood one of the hacker community’s most determined, coordinated DDoS attacks without failing.”

The AFACT attacks also affected other Netregistry sites – although an exact figure on how many sites was affected hasn’t been released. Sites affected ranged from small businesses to government sites. The hosting company posted a statement on its website for customers to make them aware that the organisation knew what was going on and what measures were been taken.

“Impact to the cluster during the peak of the attack resulted in performance degradation to websites. However, the unique cloud hosting infrastructure pioneered by Netregistry was able to scale up and carry the additional load without failing,” said a Netregistry spokesperson.

“There were some minor ancillary issues discovered during the attack that affected our infrastructure, but these were promptly resolved as they were identified with minimal customer impact.”

“No loss of data occured, the services resumed operation once the attackers IP ranges were blocked. Email was delayed in delivery, however no bounces were caused by the issue,” the site added. The Netregistry site stated that “Zeus cluster (PHP clients not utilising Apache)” had issues.

AFACT executive director Neil Gane said that this was the first attack of its kind experienced by AFCT. The executive was unable to comment on the estimated damage the attacks caused or what measures AFACT would take to identify the attackers and if they would be referring to authorities. The organisation’s site is back up at time of publication.

The attacks on AFACT follow an onslaught of attacks on Stichting Bescherming Rechten Entertainment Industrie Nederland, the Motion Picture Association of Australia, the Recording Industry Association of America (RIAA), the British Phonographic Industry (BPI) and Aiplex Software an Indian software firm that was hired to launch a DDoS attack on peer to peer hub the Pirate Bay.

Read more: https://www.news.com.au/technology/anonymous-targets-afact-with-operation-payback/story-e6frfrnr-1225931688025?area=technology#ixzz10t1dijMi