Over at SANS, they've suggested that the Adobe patch *is* related

...the 13.0.0.206 update is explicitly about this vulnerability. See:
>
> http://helpx.adobe.com/security/products/flash-player/apsb14-13.html
>
> "Adobe is aware of reports that an exploit for CVE-2014-0515 exists in the
> wild, and is being used to target Flash Player users on the Windows
> platform."
>






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*




On Mon, Apr 28, 2014 at 5:38 PM, Susan Bradley <[email protected]> wrote:

> I can't believe I'm finally finding a need to refer to CVE numbers.
>
>
>
> On 4/28/2014 2:31 PM, Rod Trent wrote:
>
>> I blame Adobe.
>>
>> -----Original Message-----
>> From: [email protected] [mailto:listsadmin@lists.
>> myitforum.com] On Behalf Of Susan Bradley
>> Sent: Monday, April 28, 2014 5:15 PM
>> To: [email protected]
>> Subject: Re: [NTSysADM] IE exploit
>>
>> Hang on, it's not the same exploit.  You are confusing two Flash vectors.
>>
>> The zero day via Fireeye is CVE-2014-1776 http://www.fireeye.com/blog/
>> uncategorized/2014/04/new-zero-day-exploit-targeting-
>> internet-explorer-versions-9-through-11-identified-in-
>> targeted-attacks.html
>>
>> The Flash patch below is a totally different Flash patch and it's from
>> Adobe.
>> http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
>> It's just via Microsoft becasuse they stuck Flash in their browser and
>> thus they update it. *CVE number:* CVE-2014-0506, CVE-2014-0507,
>> CVE-2014-0508, CVE-2014-0509
>>
>> Two totally different issues.
>>
>> Microsoft will patch all supported browsers for the weekend zero day when
>> it's ready.
>>
>> The flash patch is just a Flash update.
>>
>> On 4/28/2014 2:00 PM, Rod Trent wrote:
>>
>>> BTW: Microsoft has a patch ready for IE10 and IE11 only - for Windows
>>> 8.x and Windows Server 2012...
>>>
>>> http://windowsitpro.com/msrc/flash-fix-ie-10-and-ie-11-only
>>>
>>> *From:*[email protected]
>>> [mailto:[email protected]] *On Behalf Of *David Lum
>>> *Sent:* Monday, April 28, 2014 4:56 PM
>>> *To:* [email protected]
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>> Saw this on a forum today:  "We have one agency warning us of an
>>> exploit, and the other agency trying to use the exploit :)"
>>>
>>> FTW!
>>>
>>> -Dave Lum
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *Rod Trent
>>> *Sent:* Monday, April 28, 2014 12:04 PM
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>> It's not. Adobe has been working on today's patch since early April,
>>> working with Kaspersky. The one announced over the weekend as
>>> identified by FireEye and Microsoft is working on a patch.
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *David Lum
>>> *Sent:* Monday, April 28, 2014 3:00 PM
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>> Adobe's patch addresses CVE-2014-0515
>>>
>>> Microsoft's address CVE-2014-1776
>>>
>>> It's possible they are linked, since this article does make them seem
>>> like the same attack vector, but I do not speek enough
>>> programmer-speak to know for sure:
>>>
>>> http://www.securelist.com/en/blog/8212/New_Flash_Player_0_day_CVE_2014
>>> _0515_used_in_watering_hole_attacks
>>>
>>> -Dave Lum
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *David McSpadden
>>> *Sent:* Monday, April 28, 2014 10:37 AM
>>> *To:* '[email protected]'
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>> I thought that is what I read in the MS articles?
>>>
>>> VML and Flash were the vector for the exploit?
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *Rod Trent
>>> *Sent:* Monday, April 28, 2014 1:34 PM
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>> Yes, but that has nothing to do with the exploit reported over the
>>> weekend.
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *Kennedy, Jim
>>> *Sent:* Monday, April 28, 2014 1:13 PM
>>>
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>>
>>> Flash just released an update.
>>>
>>> http://helpx.adobe.com/security/products/flash-player/apsb14-13.html
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *Rod Trent
>>> *Sent:* Monday, April 28, 2014 1:11 PM
>>>
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>>
>>> It's all versions of Internet Explorer. However, supported versions
>>> will be patched.
>>>
>>> There are ways to mitigate:
>>>
>>> http://windowsitpro.com/windows/all-hands-deck-zero-day-reported-wild-
>>> affects-ie6-11
>>>
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *David McSpadden
>>> *Sent:* Monday, April 28, 2014 1:05 PM
>>>
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>>
>>> Is it just XP or am I wrong that the 7's, 8's, and Server OS's also an
>>> issue the way I am reading it.
>>>
>>> Especially if they have Adobe Flash (Not sure of version) and the
>>> website being visited using VML.
>>>
>>> ??
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *Rod Trent
>>> *Sent:* Monday, April 28, 2014 12:59 PM
>>>
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* RE: [NTSysADM] IE exploit
>>>
>>>
>>> The is the first in a coming list of exploits that Windows XP will be
>>> vulnerable to forever.
>>>
>>> *From:*[email protected]
>>> <mailto:[email protected]>
>>> [mailto:[email protected]] *On Behalf Of *Jonathan Link
>>> *Sent:* Monday, April 28, 2014 12:51 PM
>>>
>>> *To:* [email protected]
>>> <mailto:[email protected]>
>>> *Subject:* Re: [NTSysADM] IE exploit
>>>
>>>
>>> It's really bad if you're still running XP in your environment...
>>>
>>> On Mon, Apr 28, 2014 at 12:38 PM, David McSpadden <[email protected]
>>> <mailto:[email protected]>> wrote:
>>>
>>>      Any reason for concern?
>>>
>>>      This e-mail and any files transmitted with it are property of
>>>      Indiana Members Credit Union, are confidential, and are intended
>>>      solely for the use of the individual or entity to whom this e-mail
>>>      is addressed. If you are not one of the named recipient(s) or
>>>      otherwise have reason to believe that you have received this
>>>      message in error, please notify the sender and delete this message
>>>      immediately from your computer. Any other use, retention,
>>>      dissemination, forwarding, printing, or copying of this email is
>>>      strictly prohibited.
>>>
>>>      Please consider the environment before printing this email.
>>>
>>> This e-mail and any files transmitted with it are property of Indiana
>>> Members Credit Union, are confidential, and are intended solely for
>>> the use of the individual or entity to whom this e-mail is addressed.
>>> If you are not one of the named recipient(s) or otherwise have reason
>>> to believe that you have received this message in error, please notify
>>> the sender and delete this message immediately from your computer. Any
>>> other use, retention, dissemination, forwarding, printing, or copying
>>> of this email is strictly prohibited.
>>>
>>> Please consider the environment before printing this email.
>>>
>>> This e-mail and any files transmitted with it are property of Indiana
>>> Members Credit Union, are confidential, and are intended solely for
>>> the use of the individual or entity to whom this e-mail is addressed.
>>> If you are not one of the named recipient(s) or otherwise have reason
>>> to believe that you have received this message in error, please notify
>>> the sender and delete this message immediately from your computer. Any
>>> other use, retention, dissemination, forwarding, printing, or copying
>>> of this email is strictly prohibited.
>>>
>>> Please consider the environment before printing this email.
>>>
>>>  --
>> Got your CryptoLocker prevention in place?
>> http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
>> Our last day of XP patching.  Wave it goodbye.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
> --
> Got your CryptoLocker prevention in place?
> http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
> Our last day of XP patching.  Wave it goodbye.
>
>
>
>

Reply via email to