Exploit Kits - v1.0

Transcription

Exploit Kits - v1.0
SERT Report
Exploit Kits - v1.0
A current inventory of the most popular exploit kits,
the common payloads deployed and the targeted vulnerabilities.
www.solutionary.com
(866) 333-2133
Solutionary: SERT Exploit Kit Report - v1.0
Solutionary Exploit Kits Overview
Contents
Introduction...................................................................................................................3
Overview........................................................................................................................3
Exploit Kit Implementation Example .......................................................................5
Popular Exploit Kits.......................................................................................................6
Blackhole Exploit Kit (2.0)........................................................................................6
Eleonore (1.8.91)......................................................................................................8
Phoenix Exploit Kit (3.1.15)......................................................................................9
Sakura (1.1)............................................................................................................11
Newcomers.................................................................................................................11
RedKit....................................................................................................................11
Sweet Orange (1.1) ...............................................................................................12
The Payload.................................................................................................................13
ZeuS/Zbot..............................................................................................................14
Gameover ZeuS.....................................................................................................14
SpyEye...................................................................................................................14
Cridex.....................................................................................................................14
ZeroAccess............................................................................................................15
Common Vulnerabilities and Exposures (CVE) List.....................................................15
About Solutionary........................................................................................................21
2
Solutionary: SERT Exploit Kit Report - v1.0
Introduction
The Solutionary Security Engineering Research Team (SERT) maintains a current
inventory of the most popular exploit kits used by attackers, the common payloads
deployed and the actual vulnerabilities that are targeted by the various exploit kits.
SERT will update this report on a periodic basis to reflect the latest intelligence
Exploit kits make it relatively easy
for an attacker to take advantage
gained from the patented, cloud-based Solutionary ActiveGuard® service platform in
of the most known and reliable
addition to incident response engagements and security consulting engagements with
vulnerabilities in popular applications,
Solutionary clients.
such as Microsoft® Internet
This report was last updated on: 1/15/2013
Explorer®, Adobe® Acrobat
Reader® and Adobe Flash® Player.
Overview
Exploit kits make it relatively easy for attacks to take advantage of the most known and
easily exploitable vulnerabilities in popular applications, such as Microsoft® Internet
Explorer®, Adobe® Acrobat Reader® and Adobe Flash® Player.
Exploit kits began appearing in early 2006 with the first known - and widely popular - Web
Attacker exploit kit. This was followed by kits such as MPack and GPack, which received
significant notoriety before the Phoenix Exploit Kit (2007) and the Blackhole (2010) Exploit
Kit appeared on the scene.
Attackers install and deploy exploit kits on attacker-controlled Web servers, typically
using anonymous Web hosting services, which are widely available today. The attacker
only needs to have a basic understanding of UNIX commands to successfully install an
exploit kit. In some cases, even this knowledge is not necessary, as some toolkits can
be fully installed through a Web-based interface. Some of the malicious actors who rent
exploit kits to other attackers also offer a setup service for a small fee.
3
Solutionary: SERT Exploit Kit Report - v1.0
After the exploit kit has been deployed, the attacker’s only remaining task is to identify a
large number of victims and entice them to visit the kit’s exploit page, commonly known
as the landing page. The attacker will typically achieve this by sending phishing emails
The user is not aware that this page
containing a malicious hyperlink or a malicious HTML document as an attachment. The
hyperlink directs the victim to an attacker-controlled website that will, in turn, redirect the
victim to a maliciously crafted landing page.
will never load and that the browser
will most likely become unresponsive
and crash due to an exploit performed
The following example depicts what a typical malicious page may look like from the
perspective of the underlying HTML code. A message is displayed that tells the victim to
by content from the destination site.
Victims may not be concerned about
wait to be forwarded to another page. The user is not aware that this page will never load
and that the browser will most likely become unresponsive and crash due to an exploit
performed by content from the destination site. Victims may not be concerned about the
browser crashing because they often encounter such an occurrence. The de-obfuscated,
or rendered, content is a redirect to another site, which contains the malicious payload.
4
the browser crashing because they
often encounter such an occurrence.
Solutionary: SERT Exploit Kit Report - v1.0
No matter if the tactic used is a phishing email attack or a drive-by download, the
end result is that victims may see a message similar to “Please wait…You will be
forwarded...” in their browsers when they have, in fact, been redirected unknowingly to
the landing page of the exploit kit.
The most important criteria for
exploitation is the selection of an
appropriate exploit. Most exploit kits
Exploit Kit Implementation Example
provide different sets of exploits for
different browsers and Web browser
plug-ins.
• Identifies / creates target website to host exploit
• Configures exploit kit and chooses payload
• Hosts exploit kit on target website
• Receives phishing email
• Clicks the link in the phishing email
• Accesses target website
• Probed by target website to identify exploit to attempt
• Compromised by exploit
• Receives payload of the exploit
• Is installed on end user system
• Sets up communication chanel with attacker
• Transmits sensitive information to attacker
The most important criteria for exploitation is the selection of an appropriate exploit.
Most exploit kits provide different sets of exploits for different browsers and Web
browser plug-ins. Discovering the browser plug-ins through scripts on the landing page
often determines which exploit will be used on the victims’ browser. Exploit kit authors
continually update the available exploits in their products to maintain a high success
rate.
5
Solutionary: SERT Exploit Kit Report - v1.0
Popular Exploit Kits
In 2012, 21 different exploit kits of significant importance were either released or
updated. Some of the more popular exploit kits available are shown below.
Blackhole Exploit Kit (2.0)
The Blackhole Exploit Kit was first introduced in late 2010 and gained popularity
during 2011. Cyber criminals used the kit to spread malware during many high-profile
campaigns in 2011. It’s ease-of-use, continuous updates and ongoing support combine
to make Blackhole a popular choice for attackers. Despite the fact that many other new
kits have been released with a larger number of exploits, Blackhole continued to gain
popularity over all other exploit kits in 2012. Blackhole has been used to spread many
different pieces of malware, including Zeus, SpyEye, Cridex and various fake anti-virus
products.
Blackhole Exploit Kit 2.0 made headlines with its release in 2012. The number of
exploits in the kit was significantly reduced by removing many of the under utilized and
ineffective exploits included in the previous version (1.2.5).
Some of the exploits included in Blackhole Exploit Kit 2.0 leverage the following
vulnerabilities:
CVE
CVE-2006-0003
CVE-2010-0188
CVE-2012-0507
CVE-2012-1723
6
TITLE
Vulnerability in the Microsoft Data Access Components
(MDAC) Function could allow code execution
Adobe Acrobat and Reader Remote Code Execution
Vulnerability
Oracle Java SE / JRE AtomicReferenceArray Sandbox
Escape Code Execution
Oracle Java SE / JRE Hotspot Bytecode Verifier Type
Confusion Remote Code Execution
In 2012, 21 different exploit kits of
significant importance were either
released or updated. Some of the
more popular exploit kits available
are shown below.
Solutionary: SERT Exploit Kit Report - v1.0
CVE
CVE-2012-4681
CVE-2012-4969
TITLE
Oracle Java SE / JRE Beans Subcomponent Unspecified
Remote Code Execution
Microsoft IE CMshtmlEd::Exec() Function Use-after-free
Remote Code Execution
The following list shows vulnerabilities leveraged by exploits included in version
1.2.5:
CVE
TITLE
CVE-2006-0003
Vulnerability in the Microsoft Data Access Components
(MDAC) Function could allow code execution
CVE-2010-0188
CVE-2012-1723
CVE-2012-4681
CVE-2012-4969
CVE-2007-5659
CVE-2008-2992
CVE-2009-0927
CVE-2010-1885
CVE-2011-0559
7
Adobe Acrobat and Reader Remote Code Execution
Vulnerability
Oracle Java SE / JRE Hotspot Bytecode Verifier Type
Confusion Remote Code Execution
Oracle Java SE / JRE Beans Subcomponent Unspecified
Remote Code Execution
Microsoft IE CMshtmlEd::Exec() Function Use-after-free
Remote Code Execution
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1
Stack-based buffer overflow in Adobe Acrobat and Reader
8.1.2
Adobe Acrobat getIcon() Function PDF Handling Overflow
MS10-042: Vulnerability in Help and Support Center could
allow remote code execution
Adobe Flash Player before 10.2.152.26 allows attackers to
execute arbitrary code or cause a denial of service
Solutionary: SERT Exploit Kit Report - v1.0
CVE
TITLE
CVE-2011-2110
Adobe Flash Player Unspecified Memory Corruption
CVE-2012-1889
Microsoft XML Core Services Uninitalized Memory Object
Handling Remote Code Execution
Eleonore (1.8.91)
Since the launch of its first version in June 2009,
the Eleonore Exploit Pack has gained popularity
because of its competitive cost compared to
other exploit kits and the kit author’s monthly updates. However, exploits for more
recent vulnerabilities have failed to appear in the newer versions of the exploit kit.
Exploits included in Eleonore 1.8.91 leverage the following vulnerabilities:
CVE
TITLE
CVE-2006-0003
Vulnerability in the Microsoft Data Access Components
(MDAC) Function Could Allow Code Execution
CVE-2010-1885
CVE-2011-0559
CVE-2011-2110
CVE-2010-0806
CVE-2008-2463
8
MS10-042: Vulnerability in Help and Support Center Could
Allow Remote Code Execution
Adobe Flash Player before 10.2.152.26 allows attackers to
execute arbitrary code or cause a denial of service
Adobe Flash Player Unspecified Memory Corruption
Microsoft IE iepeers.dll Use-After-Free Arbitrary Code
Execution
Microsoft Access Snapshot Viewer ActiveX (snapview.ocx)
PrintSnapshot Method Arbitrary Code Execution
Solutionary: SERT Exploit Kit Report - v1.0
CVE
CVE-2010-0840
CVE-2010-4452
CVE-2011-0558
CVE-2011-0611
CVE-2011-2462
CVE-2011-3521
CVE-2011-3544
TITLE
Oracle Java SE / Java for Business JRE Trusted Methods
Chaining Remote Code Execution
Oracle Java SE / Java for Business sun.plug-in2.applet.
Applet2ClassLoader findClass Method Code Execution
Adobe Flash Player Function Class ActionScript Method
Handling Overflow
Adobe Flash ActionScript Predefined Class Prototype
Addition Remote Code Execution
Adobe Reader / Acrobat U3D Data Handling Remote
Memory Corruption
Oracle Java SE / JRE IIOP Deserialization Applet Handling
Remote Code Execution
Oracle Java SE / JRE Rhino Javascript Error Parsing Input
Sanitation Weakness Remote Code Execution
Phoenix Exploit Kit (3.1.15)
Phoenix Exploit Kit was originally released in 2007 and is still
positioned as a significant player in 2012. This kit currently
contains exploits for 11 vulnerabilities.
Phoenix Exploit Kit, similar to Blackhole Exploit
Kit 2.0, reduced the number of exploits included
in version 3.1.15 by eliminating some of the less
effective exploits in version 3.1.
9
Solutionary: SERT Exploit Kit Report - v1.0
Exploits included in Phoenix Exploit Kit 3.1.15 leverage the following vulnerabilities:
CVE
TITLE
CVE-2011-2110
Adobe Flash Player Unspecified Memory Corruption
CVE-2012-0507
CVE-2011-3544
Oracle Java SE / JRE AtomicReferenceArray Sandbox
Escape Code Execution
Oracle Java SE / JRE Rhino Javascript Error Parsing Input
Sanitation Weakness Remote Code Execution
Mozilla Multiple Products AttributeChildRemoved() Method
CVE-2011-3659
nsDOMAttribute Child Node Use-after-free Remote Code
Execution
CVE-2012-0500
CVE-2012-0779
CVE-2011-2371
CVE-2011-2140
CVE-2010-0248
CVE-2010-0842
Oracle Java SE Deployment Component java-vm-args
Command Argument Injection Remote Code Execution
Adobe Flash Player Object Confusion Unspecified Remote
Code Execution
Mozilla Multiple Products Array.reduceRight() Method
Overflow
Adobe Flash Player MP4 File Handling Memory Corruption
Microsoft IE Javascript Cloned DOM Object Handling
Memory Corruption
Unspecified vulnerability in the Sound component in Oracle
Java SE and Java for Business
Phoenix Exploit Kit also includes the Firefox Bootstrapped Add-on Social Engineering
Code Execution exploit from the Metasploit Framework. This exploit dynamically
creates an .xpi add-on file that is presented to the victim via a Web page. Once the
user clicks “install,” the add-on is installed and executes the payload with full user
permissions. As of Firefox 4, this will work without requiring a restart of the browser.
10
Solutionary: SERT Exploit Kit Report - v1.0
Sakura (1.1)
Sakura is a lower-end solution that costs less than the more
popular exploit kits, but has proven to be a viable option for
cyber criminals.
Exploits included in Sakura 1.1 leverage the following
vulnerabilities:
CVE
CVE-2006-0003
CVE-2010-0806
CVE-2010-0842
CVE-2012-4681
TITLE
Vulnerability in the Microsoft Data Access Components
(MDAC) Function Could Allow Code Execution
Microsoft IE iepeers.dll Use-After-Free Arbitrary Code
Execution
Unspecified vulnerability in the Sound component in Oracle
Java SE and Java for Business
Oracle Java SE / JRE Beans Subcomponent Unspecified
Remote Code Execution
Newcomers
RedKit
RedKit first appeared in 2012. The author did
not provide an “official” name for the kit, so the
researchers who discovered it named it for its
red color scheme.
11
Solutionary: SERT Exploit Kit Report - v1.0
Exploits included in RedKit leverage the following vulnerabilities:
CVE
CVE-2010-0188
CVE-2012-0507
CVE-2012-4681
TITLE
Adobe Acrobat and Reader Remote Code Execution
Vulnerability
Oracle Java SE / JRE AtomicReferenceArray Sandbox
Escape Code Execution
Oracle Java SE / JRE Beans Subcomponent Unspecified
Remote Code Execution
Sweet Orange (1.1)
The Sweet Orange exploit kit is another that first
appeared in 2012. The authors are attempting to
make sure it is difficult for non-cyber criminals to
obtain the kit.
Exploits included in Sweet Orange 1.1 leverage the following vulnerabilities:
CVE
CVE-2010-0188*
CVE-2011-3544
CVE-2006-0003
12
TITLE
Adobe Acrobat and Reader Remote Code Execution
Vulnerability
Oracle Java SE / JRE Rhino Javascript Error Parsing Input
Sanitation Weakness Remote Code Execution
Vulnerability in the Microsoft Data Access Components
(MDAC) Function Could Allow Code Execution
Solutionary: SERT Exploit Kit Report - v1.0
CVE
CVE-2012-4681
TITLE
Oracle Java SE / JRE Beans Subcomponent Unspecified
Remote Code Execution
* This claim is made by the exploit kit author, but whether the exploit exists or not has
not been validated.
Through analysis and presentation of some of the capabilities
of the exploit kits discussed, SERT is able to identify a few
interesting statistics about their capabilities and attributes.
The graph to the right illustrates the relative number of unique
CVEs across all exploit kits and the year the CVEs were issued.
The graph shows that exploit kits rely heavily on vulnerabilities
identified in 2010 and 2011.
This information may be a strong indicator that the 2010-2011
vulnerabilities still exist in many environments today and are still
useful to the attackers.
SERT has also determined what types of software are targeted
across all exploit kits reviewed for this report. As depicted in this
graph, approximately 80 percent of exploits included in the kits
targeted Java, Adobe® PDF and Internet Explorer vulnerabilities.
3%
4%
The Payload
Once the victim’s browser and operating system have been successfully compromised,
exploit kits attempt to download and install a malicious payload, which most often
results in a banking Trojan being installed. This Trojan is the remaining and most
important component of the crimeware package.
13
12%
16%
25%
40%
Solutionary: SERT Exploit Kit Report - v1.0
Some of the more popular and most common banking Trojans to-date are ZeuS or
Zbot, Gameover ZeuS, SpyEye, Cridex and ZeroAccess.
ZeuS/Zbot
ZeuS, also known as Zbot, is a Trojan horse that steals banking
information through man-in-the-browser keystroke logging and by
a method known as form grabbing. ZeuS is spread mainly through
drive-by downloads and phishing schemes.
Gameover ZeuS
Gameover ZeuS is a variant of the popular ZeuS Trojan that
appeared after the release of the ZeuS source code in May 2011.
The name Gameover ZeuS was given to this variant because
an early version contained HTTP POST requests to the C&C server that contained
the keyword “gameover”. Gameover ZeuS is a significant improvement over all other
versions of ZeuS because it replaces the centralized C&C server, a single point of failure
targeted by researchers and law enforcement, with a robust peer-to-peer (P2P) network.
SpyEye
SpyEye is a Trojan that steals banking information via man-in-the-browser keystroke
logging and form grabbing. SpyEye was the leading competitor to ZeuS. Zeus source
code, however, was shared with SpyEye and the relationship became more of a
collaboration between the Trojans as opposed to competition.
Cridex
Cridex is a Trojan that steals banking information by both man-in-the-browser keystroke
logging and form grabbing. Cridex also attempts to harvest user credentials for social
media sites. Cridex is similar to ZeuS in that it is able to inject code into HTML pages
on websites contained in the configuration file and to monitor and manipulate cookies.
The stolen data is saved into a file and sent back to a C&C server.
14
Solutionary: SERT Exploit Kit Report - v1.0
ZeroAccess
ZeroAccess is a kernel-mode rootkit similar to the TDSS family of malware (including
Alureon, Tidserv, TDL). It uses advanced techniques to hide its presence, is capable of
functioning on both 32-bit and 64-bit flavors of Windows from a single installer, contains
aggressive self-defense functionality and acts as a sophisticated delivery platform for
other malware.
Common Vulnerabilities and Exposures (CVE) List
The Common Vulnerabilities and Exposures (CVE - http://cve.mitre.org/) list is a
dictionary of common names for publicly known information security vulnerabilities. A
list of each CVE used with specific exploit kits is provided in the table below.
Exploit kits are dynamic in nature and continuously evolving. The CVEs reported
for each exploit kit are accurate up to the publication of this report. The exploit kit
developers however may have modified the CVEs since publication.
CVE
SOFTWARE
DESCRIPTION
Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained
CVE-2006-0003
MS IE
in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components
(MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown
attack vectors.
Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote
CVE-2007-5659
/2008-0655
ADOBE PDF
attackers to execute arbitrary code via a PDF file with long arguments to unspecified
JavaScript methods.
Exploit - collab, collectEmaillnfo
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows
remote attackers to execute arbitrary code via a PDF file that calls the util.printf
CVE-2008-2992
ADOBE PDF
JavaScript function with a crafted format string argument, a related issue to CVE2008-1104.
Exploit - util.printf
15
Solutionary: SERT Exploit Kit Report - v1.0
CVE
SOFTWARE
DESCRIPTION
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8
before 8.1.3, and 7 before 7.1.1 allows remote attackers to execute arbitrary code via
CVE-2009-0927
ADOBE PDF
a crafted argument to the getIcon method of a Collab object, a different vulnerability
than CVE-2009-0658.
Exploit - collab.getlco
Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before
CVE-2010-0188
ADOBE PDF
9.3.1 allows attackers to cause a denial of service (application crash) or possibly
execute arbitrary code via unknown vectors.
Exploit - LibTiff Integer Overflow
Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in
Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute
CVE-2010-0806
MS IE
arbitrary code via vectors involving access to an invalid pointer after the deletion of an
object, as exploited in the wild in March 2010, aka “Uninitialized Memory Corruption
Vulnerability.”
Unspecified vulnerability in the Sound component in Oracle Java SE and Java
for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote
attackers to affect confidentiality, integrity, and availability via unknown vectors.
CVE-2010-0842
JAVA
NOTE: the above information was obtained from the March 2010 CPU. Oracle has
not commented on claims from a reliable researcher that this is an uncontrolled array
index that allows remote attackers to execute arbitrary code via an MIDI file with a
crafted MixerSequencer object, related to the GM_Song structure.
The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support
Center in Windows XP and in Windows Server 2003 does not properly handle
CVE-2010-1885
MS HCP
malformed escape sequences. This allows remote attackers to bypass the trusted
documents whitelist (from HCP option) and execute arbitrary commands via a crafted
hcp:// URL, aka "Help Center URL Validation Vulnerability."
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 do not properly handle objects in
CVE-2010-0248
MS IE
memory, which allows remote attackers to execute arbitrary code by accessing
an object that (1) was not properly initialized or (2) is deleted, leading to memory
corruption, aka "HTML Object Memory Corruption Vulnerability."
16
Solutionary: SERT Exploit Kit Report - v1.0
CVE
SOFTWARE
DESCRIPTION
Unspecified vulnerability in the Deployment component in Java Runtime Environment
(JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows
CVE-2010-4452
JAVA
remote untrusted Java Web Start applications and untrusted Java applets to affect
confidentiality, integrity, and availability via unknown vectors.
Sun Java Applet2ClassLoader Remote Code Execution Exploit
CVE-2011-0558
ADOBE
FLASH
Integer overflow in Adobe Flash Player before 10.2.152.26 allows attackers to execute
arbitrary code via a large array length value in the ActionScript method of the Function
class.
Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code
or cause a denial of service (memory corruption) via crafted parameters to an
CVE-2011-0559
ADOBE
unspecified ActionScript method that causes a parameter to be used as an object
FLASH
pointer, a different vulnerability than CVE-2011-0560, CVE-2011-0561, CVE-20110571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE2011-0607, and CVE-2011-0608.
Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris
and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.
dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1
on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X,
CVE-2011-0611
ADOBE
FLASH
and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac
OS X allow remote attackers to execute arbitrary code or cause a denial of service
(application crash) via crafted Flash content, as demonstrated by a Microsoft Office
document with an embedded .swf file that has a size inconsistency in a “group of
included constants,” object type confusion, ActionScript that adds custom functions
to prototypes, and Date objects; and as exploited in the wild in April 2011.
Microsoft Office document with an embedded .swf file.
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris,
CVE-2011-2110
ADOBE
and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary
FLASH
code or cause a denial of service (memory corruption) via unspecified vectors, as
exploited in the wild in June 2011.
17
Solutionary: SERT Exploit Kit Report - v1.0
CVE
SOFTWARE
DESCRIPTION
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris;
before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac
CVE-2011-2140
ADOBE
OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code
FLASH
or cause a denial of service (memory corruption) via unspecified vectors, a different
vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425. MP4
SequenceParameterSetNALUnit Buffer Overflow Exploit
Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and
CVE-2011-2371
MOZILLA
4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows
FIREFOX
remote attackers to execute arbitrary code via vectors involving a long JavaScript
Array object. Array.reduceRight() Exploit
Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1
CVE-2011-2462
ADOBE PDF
and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on
UNIX, allows remote attackers to execute arbitrary code or cause a denial of service
(memory corruption) via unknown vectors, as exploited in the wild in December 2011.
Unspecified vulnerability in the Java Runtime Environment component in Oracle
CVE-2011-3521
JAVA
Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 earlier allows
remote untrusted Java Web Start applications and untrusted Java applets to affect
confidentiality, integrity, and availability via unknown vectors related to Deserialization.
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java
SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web
CVE-2011-3544
JAVA
Start applications and untrusted Java applets to affect confidentiality, integrity, and
availability via unknown vectors related to Scripting.
Also affects Rhino Script Engine
Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0,
CVE-2011-3659
MOZILLA
FIREFOX
Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might
allow remote attackers to execute arbitrary code via vectors related to incorrect
AttributeChildRemoved notifications that affect access to removed nsDOMAttribute
child nodes.
18
Solutionary: SERT Exploit Kit Report - v1.0
CVE
SOFTWARE
DESCRIPTION
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle
Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier
CVE-2012-0500
JAVA
allows remote untrusted Java Web Start applications and untrusted Java applets
to affect confidentiality, integrity, and availability via unknown vectors related to
Deployment.
Sun Java Web Start Plug-in Command Line Argument Injection
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle
Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and
earlier allows remote attackers to affect confidentiality, integrity, and availability via
unknown vectors related to Concurrency. NOTE: the above information was obtained
CVE-2012-0507
JAVA
from the February 2012 Oracle CPU. Oracle has not commented on claims from a
downstream vendor and third-party researchers that this issue occurs because the
AtomicReferenceArray class implementation does not ensure that the array is of
the Object[] type, which allows attackers to cause a denial of service (JVM crash) or
bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE2011-3571, but that identifier was already assigned to a different issue.
Adobe Flash Player before 10.3.183.19 and 11.x before 11.2.202.235 on Windows,
CVE-2012-0779
ADOBE
FLASH
Mac OS X, and Linux; before 11.1.111.9 on Android 2.x and 3.x; and before
11.1.115.8 on Android 4.x allows remote attackers to execute arbitrary code via a
crafted file, related to an "object confusion vulnerability," as exploited in the wild in
May 2012.
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle
CVE-2012-1723
JAVA
Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and
1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and
availability via unknown vectors related to Hotspot.
Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 access uninitialized memory
CVE-2012-1889
XML
locations, which allows remote attackers to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted web site.
19
Solutionary: SERT Exploit Kit Report - v1.0
CVE
SOFTWARE
DESCRIPTION
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle
Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via
a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.
CVE-2012-4681
JAVA
beans.finder.ClassFinder.findClass and leveraging an exception with the forName
method to access restricted classes from arbitrary packages such as sun.awt.
SunToolkit, then (2) using “reflection with a trusted immediate caller” to leverage the
getField method to access and modify private fields, as exploited in the wild in August
2012 using Gondzz.class and Gondvv.class.
Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft
CVE-2012-4969
MS IE
Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a
crafted web site, as exploited in the wild in September 2012.
Conclusion
Exploit kits remain a popular method for cyber criminals to execute attacks on
unknowing victims. These kits are frequently updated and modified to take advantage
of newly-discovered vulnerabilities and to elude security researcher as well as law
enforcement. Using an exploit kit, attackers without a great deal of computer savvy are
able to execute attacks. Staying informed about the latest updates to exploit kits, the
vulnerabilities they exploit and the attacks they employ will help organizations as well as
end-users thwart the efforts of attackers and protect themselves from attacks.
20
Solutionary: SERT Exploit Kit Report - v1.0
About Solutionary
Solutionary is the leading pure-play managed security service provider (MSSP), focused
on delivering managed security services and global threat intelligence. Comprehensive
Solutionary security monitoring and security device management services protect
traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary
Learn More
clients are able to optimize current security programs, make informed security
decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based
ActiveGuard® service platform uses multiple detection technologies and advanced
analytics to protect against advanced threats. The Solutionary Security Engineering
Research Team (SERT) researches the global threat landscape, providing actionable
threat intelligence, enhanced threat detection and mitigating controls. Experienced,
certified Solutionary security experts act as an extension of clients’ internal teams,
providing industry-leading client service to global enterprise and mid-market clients in a
wide range of industries, including financial services, healthcare, retail and government.
Services are delivered 24/7 through multiple, state-of-the-art Security Operations Centers
(SOCs) in North America.
To learn more about Solutionary,
the leading pure-play Managed
Security Service Provider,
and how the ActiveGuard®
service platform could protect
your enterprise, request a
demonstration today by calling
866-333-2133.
Contact Solutionary at: [email protected] or 866-333-2133
Solutionary.com
ActiveGuard® US Patent Numbers: 7,168,093; 7,424,743; 6,988,208; 7,370,359; 7,673,049; 7,954,159, 8,261,347.
Solutionary, the Solutionary logo, ActiveGuard, the ActiveGuard logo, are registered trademarks or service marks
of Solutionary, Inc. or its subsidiaries in the United States. Other marks and brands may be claimed as the property
of others. The product plans, specifications, and descriptions herein are provided for information only and subject
to change without notice, and are provided without warranty of any kind, express or implied. Copyright ©2013
Solutionary, Inc.
Solutionary, Inc.
21
9420 Underwood Ave., 3rd Floor
Omaha, NE 68114
1174SR
02/13