July proved to be quite an eventful month for security researchers! First, we had 0Day in Microsoft video ActiveX controller exploiting DirectShow discussed here, then another 0Day in Office Web Component (OWC), followed by a 0Day in Firefox, and ended with a 0Day in Adobe Flash player. Each of these vulnerabilities is being exploited in the wild right now and switching from one browser to another is no longer a solution. Instead, users should take all precautionary measures suggested by vendors to avoid these exploits and they should also update their systems as soon as the fix is out for vulnerable components.
Another interesting point to notice in all these exploits is their transport mechanism. In most cases, attackers try to lure users to visit a site hosting the exploit. However, due to diligent work by security researchers, it is becoming harder to keep specific malware serving sites up for a long time before they get block-listed! So what does an attacker do? Find a reputable site that can host the malware! Why would a valid site host malware? They won't ‘knowingly’ but what if bad stuff gets in their via door site owners don’t know about! Attackers are trying to find holes like SQLInjection in legitimate sites not to steal data but to inject malicious scripts that make their way back to the webpage served to the user when users visit the site. One real-world attempt to serve exploits for OWC is reported here. So this is not all theory but happening now. You can only imagine millions of other websites that are ready to be victims of these kinds of exploits. If you have a site make sure you do everything to not become an attacker’s accomplice.
For now, users can set the killbit for ActiveX controls as suggested by Microsoft for OWC and for Microsoft Video control ActiveX component. Users using Firefox 3.5 should update to 3.5.1 a new release issued by Mozilla fixing the issue. Adobe has released a fix for Flash plugin.