Threat intelligence firm iSight Partners has announced the discovery of a new remote code execution zero day vulnerability affecting all supported versions of Microsoft Windows, Server 2008 and 2012, and linked to a Russian espionage group known as "Sandworm."
The vulnerability, CVE-2014-4114, was discovered by iSight at the beginning of September in spear-phishing attacks from “Sandworm Team” using a weaponized PowerPoint attachment, the firm said in a blog post.
It will be patched in today’s monthly security update from Microsoft.
The flaw exists in the in the “OLE package manager” in Windows and Microsoft Server, allowing an attacker to remotely execute arbitrary code if they can convince a victim to open a specially crafted file via social engineering techniques.
“The vulnerability exists because Windows allows the OLE packager (packager .dll) to download and execute INF files,” the firm explained.
“In the case of the observed exploit, specifically when handling Microsoft PowerPoint files, the packagers allows a Package OLE object to reference arbitrary external files, such as INF files, from untrusted sources. This will cause the referenced files to be downloaded in the case of INF files, to be executed with specific commands.”
The threat intelligence firm said it has been working with Microsoft to monitor the use of the vulnerability and work on a patch, and added that it appears to have been used only by the Sandworm group.
The group itself has been referenced in the past by ESET and F-Secure (which named it “Quedagh”) in relation to BlackEnergy attacks on various entities in Eastern Europe and elsewhere.
This article has been extracted from http://www.infosecurity-magazine.com/, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/
Montash is a multi-award winning, global IT recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:
ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.
Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.