Auf GitHub veröffentlicht eine detaillierte Analyse der BlueKeep Verwundbarkeit, die Erstellung von Exploits vereinfacht

Im Rahmen des „Tuesday-Updates“ Mais, Microsoft reparierte die kritische Sicherheitslücke CVE-2019-0708 (auch als BlueKeep bekannt) für den Betrieb von Remote Desktop Service im Zusammenhang (RDS) und RDP.

EINlthough the technical details of the problem were not disclosed due to its high level of threat, it is known that with the help of this bug attackers can execute arbitrary code without authorization and distribute their malware like a worm, wie, Zum Beispiel, it was famous WannaCry und NotPetya Malware.

Das Problem ist gefährlich für Windows Server 2008, Windows 7, Windows 2003 und Windows XP, for these versions were released security updates.

Microsoft experts have already warned about this problem twice, and experts from several information security companies (einschließlich Zerodium, McAfee, Check Point und Kaspersky Lab) and independent researchers have created proof of exploits’ concept for BlueKeep.

The code for these exploits has not been made publicly available due to a high a risk. In Ergänzung, for the vulnerability has already been created module Metasploit (also not available in the public domain).

Letzte Woche, BitSight Fachwelt veröffentlicht another depressing statistics: entsprechend ihrer Daten, Über 800,000 devices are still vulnerable to BlueKeep. Offenbar, users of these devices should think about installing patches as soon as possible, since yesterday on GitHub was published a presentation detailing the use of the vulnerability and creation of an exploit.

According BitSight about 800,000 devices are still vulnerable to BlueKeep
According BitSight about 800,000 devices are still vulnerable to BlueKeep

Slides of this presentation almost entirely written in Chinese. On them mentioned 2019 Security Development Conference and name of the famous Chinese company Tencent KeenLab. The two slides also contain the worddemo”.

LESEN  Zum Schutz vor ähnlich wie WannaCry Wurm veröffentlichte Microsoft Updates für alte Windows-Versionen

ArsTechnica journalists asked information security specialists about the presentation, interviewing independent expert Marcus Hutchins and Rendition Infosec co-founder and former developer of exploits for the NSA, Jake Williams.

“One of the only things standing in the way of real-world attacks is the expertise required to write exploits that remotely execute code without crashing the computer first”, — said Marcus Hutchins.

Im Algemeinen, both specialists agree that the situation is very serious, since publishing a detailed presentation significantly lowers chances for creating RCE exploits for BlueKeep. The fact is that the slides show in detail how to implement heap spraying, Das ist, according to the presentation, is one of the most difficult tasks during creation of an exploit.

It’s the most detailed publicly available technical documentation we’ve seen so far”, — explained Jake Williams.

He also suggested that Tencent KeenLab experts obviously created and demonstrated at the conference an RCE-exploit for BlueKeep, although the PoC itself was not published.

lesen Sie auch: Teilnehmer des Metasploit-Projekt erstellt ein Arbeitsmodul für die BlueKeep Verwundbarkeit ausnutzen

Vorher, security experts believed that BlueKeep’s exploits would be widely available around mid-August, after the end of Black Hat und Defcon conferences in Las Vegas. jedoch, now they are inclined to assume that this will happen earlier.

[Gesamt:0    Durchschnitt: 0/5]

Über Trojan Mörder

Tragen Sie Trojan Killer-Portable auf Ihrem Memory-Stick. Achten Sie darauf, dass Sie in der Lage sind, Ihr PC keine Cyber-Bedrohungen widerstehen zu helfen, wo immer Sie sind.

überprüfen Sie auch

Stackoverflow Java Code-Fehler

Das am häufigsten kopierte Stück Java-Code auf Stackoverflow enthält einen Fehler

Wie sich herausstellte, the most copied piece of Java code on StackOverflow contains an

MageCart auf der Heroku Cloud Platform

Die Forscher fanden mehrere MageCart Web Skimmer Auf Heroku Cloud Platform

Forscher an Malwarebytes berichteten über mehr MageCart Web-Skimmer auf der Heroku Cloud-Plattform zu finden, …

Hinterlasse eine Antwort