A Windows 98 & ME forum. Win98banter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » Win98banter forum » Windows 98 » General
Site Map Home Authors List Search Today's Posts Mark Forums Read Web Partners

PDF exploits shown in this comparison as exceeding Flash based



 
 
Thread Tools Display Modes
  #1  
Old February 16th 10, 06:37 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
MEB[_17_]
External Usenet User
 
Posts: 1,830
Default PDF exploits shown in this comparison as exceeding Flash based


Excuse the cross post, however, Windows 9X [being left out of the
updating process] is just as vulnerable, if not more, than using
outdated applications in other OSs.

A basic explanation is found he
http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

I suggest following the linked materials, and further research into the
various methods being used.
NOTE: that the use of "traffic optimization", which is running programs
to detect the available exploitable aspects in any given OS and/or
system, has increased, and is now the preferred method being used for
malicious activity distribution purposes.

--
MEB
http://peoplescounsel.org/ref/windows-main.htm
Windows Info, Diagnostics, Security, Networking
http://peoplescounsel.org
The "real world" of Law, Justice, and Government
___---
  #2  
Old February 16th 10, 10:47 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
Jesper Ravn
External Usenet User
 
Posts: 4
Default PDF exploits shown in this comparison as exceeding Flash based

"MEB" skrev i meddelelsen
...

Excuse the cross post, however, Windows 9X [being left out of the
updating process] is just as vulnerable, if not more, than using
outdated applications in other OSs.

A basic explanation is found he
http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

I suggest following the linked materials, and further research into the
various methods being used.
NOTE: that the use of "traffic optimization", which is running programs
to detect the available exploitable aspects in any given OS and/or
system, has increased, and is now the preferred method being used for
malicious activity distribution purposes.


Hello

To me it's just another fuzz story from a mainstream security magazine/blog,
that don't focus on a good prevention strategy.
All they care about is the scary headline and the same boring conclusion
about Firefox......

I really miss the word's "principle of least privilege" and "deny-all
policies" in the security debate today.

/Jesper

  #3  
Old February 16th 10, 10:47 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
Jesper Ravn
External Usenet User
 
Posts: 4
Default PDF exploits shown in this comparison as exceeding Flash based

"MEB" skrev i meddelelsen
...

Excuse the cross post, however, Windows 9X [being left out of the
updating process] is just as vulnerable, if not more, than using
outdated applications in other OSs.

A basic explanation is found he
http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

I suggest following the linked materials, and further research into the
various methods being used.
NOTE: that the use of "traffic optimization", which is running programs
to detect the available exploitable aspects in any given OS and/or
system, has increased, and is now the preferred method being used for
malicious activity distribution purposes.


Hello

To me it's just another fuzz story from a mainstream security magazine/blog,
that don't focus on a good prevention strategy.
All they care about is the scary headline and the same boring conclusion
about Firefox......

I really miss the word's "principle of least privilege" and "deny-all
policies" in the security debate today.

/Jesper

  #4  
Old February 16th 10, 11:18 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
David H. Lipman
External Usenet User
 
Posts: 365
Default PDF exploits shown in this comparison as exceeding Flash based

From: "MEB"


| Excuse the cross post, however, Windows 9X [being left out of the
| updating process] is just as vulnerable, if not more, than using
| outdated applications in other OSs.

| A basic explanation is found he
| http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

| I suggest following the linked materials, and further research into the
| various methods being used.
| NOTE: that the use of "traffic optimization", which is running programs
| to detect the available exploitable aspects in any given OS and/or
| system, has increased, and is now the preferred method being used for
| malicious activity distribution purposes.


Updates for Adobe Reader and Adobe Acrobat were posted Today.

Adobe Reader/Acrobat V9.1.3 and v8.2.1

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


  #5  
Old February 16th 10, 11:18 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
David H. Lipman
External Usenet User
 
Posts: 365
Default PDF exploits shown in this comparison as exceeding Flash based

From: "MEB"


| Excuse the cross post, however, Windows 9X [being left out of the
| updating process] is just as vulnerable, if not more, than using
| outdated applications in other OSs.

| A basic explanation is found he
| http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

| I suggest following the linked materials, and further research into the
| various methods being used.
| NOTE: that the use of "traffic optimization", which is running programs
| to detect the available exploitable aspects in any given OS and/or
| system, has increased, and is now the preferred method being used for
| malicious activity distribution purposes.


Updates for Adobe Reader and Adobe Acrobat were posted Today.

Adobe Reader/Acrobat V9.1.3 and v8.2.1

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


  #6  
Old February 16th 10, 11:21 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
David H. Lipman
External Usenet User
 
Posts: 365
Default PDF exploits shown in this comparison as exceeding Flash based

From: "Jesper Ravn"

| Hello

| To me it's just another fuzz story from a mainstream security magazine/blog,
| that don't focus on a good prevention strategy.
| All they care about is the scary headline and the same boring conclusion
| about Firefox......

| I really miss the word's "principle of least privilege" and "deny-all
| policies" in the security debate today.

| /Jesper

Exploitation of PDF vulnerabilities is a very REAL and present problem. I have seen
NUMEROUS malcious PDF files and I have seen numerous web sites using PDF exploit code.

I'll be hones, I did not readet the ZiffDavis blog but, I know what it is based upon and
the threat is real.

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


  #7  
Old February 16th 10, 11:21 PM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
David H. Lipman
External Usenet User
 
Posts: 365
Default PDF exploits shown in this comparison as exceeding Flash based

From: "Jesper Ravn"

| Hello

| To me it's just another fuzz story from a mainstream security magazine/blog,
| that don't focus on a good prevention strategy.
| All they care about is the scary headline and the same boring conclusion
| about Firefox......

| I really miss the word's "principle of least privilege" and "deny-all
| policies" in the security debate today.

| /Jesper

Exploitation of PDF vulnerabilities is a very REAL and present problem. I have seen
NUMEROUS malcious PDF files and I have seen numerous web sites using PDF exploit code.

I'll be hones, I did not readet the ZiffDavis blog but, I know what it is based upon and
the threat is real.

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


  #8  
Old February 17th 10, 12:23 AM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
Jesper Ravn
External Usenet User
 
Posts: 4
Default PDF exploits shown in this comparison as exceeding Flash based



"David H. Lipman" skrev i meddelelsen
...
From: "Jesper Ravn"

| Hello

| To me it's just another fuzz story from a mainstream security
magazine/blog,
| that don't focus on a good prevention strategy.
| All they care about is the scary headline and the same boring conclusion
| about Firefox......

| I really miss the word's "principle of least privilege" and "deny-all
| policies" in the security debate today.

| /Jesper

Exploitation of PDF vulnerabilities is a very REAL and present problem. I
have seen
NUMEROUS malcious PDF files and I have seen numerous web sites using PDF
exploit code.

I'll be hones, I did not readet the ZiffDavis blog but, I know what it is
based upon and
the threat is real.


Hi David

Yes I know its a real problem. But the basic prevention against "remote code
execution" is the same.
Secure your browser (disable/promt javascript - disable adobe plugins).

If that is not convenient for you, go with a one time setup like LUA/SRP (no
need for ongoing adjustment/tweaks)

Another approach could be an application like Anti-Executable from Faronics.
It a simple stand-alone applikation where the deny-all policy takes place.
For the average user it's an easy setup and go. No need to learn anything
about basic security :-).
To bad it's not freeware anymore.

/Jesper



  #9  
Old February 17th 10, 12:23 AM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
Jesper Ravn
External Usenet User
 
Posts: 4
Default PDF exploits shown in this comparison as exceeding Flash based



"David H. Lipman" skrev i meddelelsen
...
From: "Jesper Ravn"

| Hello

| To me it's just another fuzz story from a mainstream security
magazine/blog,
| that don't focus on a good prevention strategy.
| All they care about is the scary headline and the same boring conclusion
| about Firefox......

| I really miss the word's "principle of least privilege" and "deny-all
| policies" in the security debate today.

| /Jesper

Exploitation of PDF vulnerabilities is a very REAL and present problem. I
have seen
NUMEROUS malcious PDF files and I have seen numerous web sites using PDF
exploit code.

I'll be hones, I did not readet the ZiffDavis blog but, I know what it is
based upon and
the threat is real.


Hi David

Yes I know its a real problem. But the basic prevention against "remote code
execution" is the same.
Secure your browser (disable/promt javascript - disable adobe plugins).

If that is not convenient for you, go with a one time setup like LUA/SRP (no
need for ongoing adjustment/tweaks)

Another approach could be an application like Anti-Executable from Faronics.
It a simple stand-alone applikation where the deny-all policy takes place.
For the average user it's an easy setup and go. No need to learn anything
about basic security :-).
To bad it's not freeware anymore.

/Jesper



  #10  
Old February 17th 10, 04:11 AM posted to microsoft.public.win98.gen_discussion,microsoft.public.security.homeusers
MEB[_17_]
External Usenet User
 
Posts: 1,830
Default PDF exploits shown in this comparison as exceeding Flash based

On 02/16/2010 06:18 PM, David H. Lipman wrote:
From: "MEB"


| Excuse the cross post, however, Windows 9X [being left out of the
| updating process] is just as vulnerable, if not more, than using
| outdated applications in other OSs.

| A basic explanation is found he
| http://blogs.zdnet.com/security/?p=5473&tag=nl.e539

| I suggest following the linked materials, and further research into the
| various methods being used.
| NOTE: that the use of "traffic optimization", which is running programs
| to detect the available exploitable aspects in any given OS and/or
| system, has increased, and is now the preferred method being used for
| malicious activity distribution purposes.


Updates for Adobe Reader and Adobe Acrobat were posted Today.

Adobe Reader/Acrobat V9.1.3 and v8.2.1


Well, I would love to say that will take care of the PDF issues, but we
all know it won't. The allowance of internal coding, external linking,
and other now allowed within the PDF format is the problem. Were this a
world where people weren't trying "to make a buck" anyway they can, we
might be able to consider that these WILL solve the problems; but people
are what they are; money, desire for fame in some form, and all of those
not so acceptable human factors rule the day.
So how many of these SUPPOSED PDF vulnerabilities and fixes is that
now, 30, 40, 50, ??

The article and more importantly the linked materials also describes
other forms now being used beyond PDF, and that the methodology has
significantly changed to avoid detection with increased polymorphic
techniques, or even farther beyond the previous normal attack vectors
where single hack styles may have been involved, to the point of probing
the individuals system for ANY and ALL vulnerabilities once ANY entry
point is found and proofed.

--
MEB
http://peoplescounsel.org/ref/windows-main.htm
Windows Info, Diagnostics, Security, Networking
http://peoplescounsel.org
The "real world" of Law, Justice, and Government
___---
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
New Adobe Reader Zero Day Exploits - New FireFox exploits MEB[_16_] General 28 May 5th 09 12:29 AM
Registry and system.dat comparison Bill P. General 9 August 27th 06 04:53 AM
Comparison of W98SE and ME? ms General 5 May 12th 05 06:58 PM
Win98 comparison [email protected] General 3 September 14th 04 10:01 AM
Spybot and DSO Exploits Alias General 2 September 7th 04 04:03 PM


All times are GMT +1. The time now is 10:43 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 Win98banter.
The comments are property of their posters.