Trying?  Let's go with has been using...

On Mon, Apr 28, 2014 at 4:56 PM, David Lum <[email protected]> wrote:

> Saw this on a forum today:  ”We have one agency warning us of an exploit,
> and the other agency trying to use the exploit :)”
>
>
>
> FTW!
>
>
>
> -Dave Lum
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 12:04 PM
>
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> It’s not. Adobe has been working on today’s patch since early April,
> working with Kaspersky. The one announced over the weekend as identified by
> FireEye and Microsoft is working on a patch.
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David Lum
> *Sent:* Monday, April 28, 2014 3:00 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> Adobe’s patch addresses CVE-2014-0515
>
> Microsoft’s address CVE-2014-1776
>
>
>
> It’s possible they are linked, since this article does make them seem like
> the same attack vector, but I do not speek enough programmer-speak to know
> for sure:
>
>
> http://www.securelist.com/en/blog/8212/New_Flash_Player_0_day_CVE_2014_0515_used_in_watering_hole_attacks
>
>
>
> -Dave Lum
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Monday, April 28, 2014 10:37 AM
> *To:* '[email protected]'
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> I thought that is what I read in the MS articles?
>
> VML and Flash were the vector for the exploit?
>
>
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 1:34 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> Yes, but that has nothing to do with the exploit reported over the weekend.
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Kennedy, Jim
> *Sent:* Monday, April 28, 2014 1:13 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> Flash just released an update.
>
>
>
> http://helpx.adobe.com/security/products/flash-player/apsb14-13.html
>
>
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 1:11 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> It’s all versions of Internet Explorer. However, supported versions will
> be patched.
>
>
>
> There are ways to mitigate:
>
>
>
>
> http://windowsitpro.com/windows/all-hands-deck-zero-day-reported-wild-affects-ie6-11
>
>
>
> *From:* [email protected] <[email protected]> [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Monday, April 28, 2014 1:05 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> Is it just XP or am I wrong that the 7’s, 8’s, and Server OS’s also an
> issue the way I am reading it.
>
> Especially if they have Adobe Flash (Not sure of version) and the website
> being visited using VML.
>
> ??
>
>
>
> *From:* [email protected] <[email protected]> [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 12:59 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] IE exploit
>
>
>
> The is the first in a coming list of exploits that Windows XP will be
> vulnerable to forever.
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Jonathan Link
> *Sent:* Monday, April 28, 2014 12:51 PM
> *To:* [email protected]
> *Subject:* Re: [NTSysADM] IE exploit
>
>
>
> It's really bad if you're still running XP in your environment...
>
>
>
> On Mon, Apr 28, 2014 at 12:38 PM, David McSpadden <[email protected]> wrote:
>
> Any reason for concern?
>
>
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
>
>
> Please consider the environment before printing this email.
>
>
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
>
>
> Please consider the environment before printing this email.
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
>
>
> Please consider the environment before printing this email.
>

Reply via email to