{"id":502,"date":"2009-07-08T22:48:19","date_gmt":"2009-07-08T15:48:19","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=502"},"modified":"2009-07-09T19:08:28","modified_gmt":"2009-07-09T12:08:28","slug":"hackers-exploit-second-directshow-zero-day-using-thousands-of-hijacked-sites","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2009\/07\/hackers-exploit-second-directshow-zero-day-using-thousands-of-hijacked-sites\/","title":{"rendered":"Hackers exploit second DirectShow zero-day using thousands of hijacked sites"},"content":{"rendered":"<p id=\"first_paragraph\" style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">Thousands of legitimate Web sites hacked over the weekend are launching drive-by attacks using an exploit of a second critical unpatched vulnerability in Windows&#8217; DirectShow component, a Danish security company said today.According to CSIS Security Group, the bug is in an ActiveX control, the &#8220;msvidctl.dll&#8221; file, that streams video content.<!--more--><\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">&#8220;CSIS has captured more systematic drive-by attacks exploiting a vulnerability in Microsoft DirectShow,&#8221; the company warned on its Web site. &#8220;Thousands of Web sites have been compromised over the weekend and malicious script has been insert[ed],&#8221; it added (<a style=\"cursor: pointer; text-decoration: underline; color: #000099;\" href=\"http:\/\/translate.google.com\/translate?js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;u=http%3A%2F%2Fwww.csis.dk%2Fen%2Fnews%2Fnews.asp%3FtekstID%3D799%26side%3D1&amp;sl=da&amp;tl=en&amp;history_state0=\" target=\"new\">Google Translate translation<\/a>).<\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">The script re-routes users to a malicious site, which in turn downloads and launches a multi-exploit hacker toolkit that includes the DirectShow attack code. DirectShow is a part of Windows&#8217; DirectX graphics infrastructure.<\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">Windows 2000, XP and Server 2003 are all vulnerable to attack, CSIS said.<\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">Another Danish security firm, Copenhagen-based Secunia, ranked the vulnerability as\u00a0<a style=\"cursor: pointer; text-decoration: underline; color: #000099;\" href=\"http:\/\/secunia.com\/advisories\/35683\/\" target=\"new\">&#8220;Extremely critical,&#8221;<\/a> its highest threat rating. Secunia had no additional information about the bug, however.<\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">This newly-exploited vulnerability is the second unpatched DirectShow bug to surface in the last five weeks. In late May, Microsoft issued a security advisory that reported\u00a0<a style=\"cursor: pointer; text-decoration: underline; color: #000099;\" href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&amp;articleId=9133648\">hackers were exploiting<\/a> a different DirectShow bug, this one in its QuickTime media parser. A week ago, Symantec said that attack code for the QuickTime parser vulnerability had been added to a multi-exploit toolkit, and that users<a style=\"cursor: pointer; text-decoration: underline; color: #000099;\" href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&amp;articleId=9134645\">should expect more attacks<\/a>.<\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">Hackers have been using the QuickTime parser bug since May, Microsoft has acknowledged.<\/p>\n<p style=\"margin-top: 0px; margin-right: 0px; margin-bottom: 8px; margin-left: 0px; padding: 0px;\">more from <a href=\"http:\/\/www.computerworld.com\/s\/article\/9135210\/Hackers_exploit_second_DirectShow_zero_day_using_thousands_of_hijacked_sites?taxonomyId=85&amp;intsrc=kc_top&amp;taxonomyName=spam,_malware_and_vulnerabilities\" target=\"_blank\">Computer World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thousands of legitimate Web sites hacked over the weekend are launching drive-by attacks using an exploit of a second critical unpatched vulnerability in Windows&#8217; DirectShow component, a Danish security company&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6,3],"tags":[25,24],"class_list":["post-502","post","type-post","status-publish","format-standard","hentry","category-m","category-security","tag-0day","tag-microsoft"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-86","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=502"}],"version-history":[{"count":8,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/502\/revisions"}],"predecessor-version":[{"id":504,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/502\/revisions\/504"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}