FireEye Uncovers 7 Zero Day Flaws That Hackers Use To Carry Advanced Attacks

|

FireEye Inc., announced that the company has discovered seven zero-day vulnerabilities during the first half of 2013. Each of the vulnerabilities uncovered was exploited by advanced attacks across a number of applications, including Microsoft Internet Explorer, Adobe Flash, PDFs, Oracle, and Java, and highlight a growing trend of organizations seeing damage to their reputations and critical infrastructure due to highly publicized zero-day threats.

 
FireEye Uncovers 7 Zero Day Flaws That Are Used For Advanced Attacks

"The consistent discovery of flaws by FireEye demonstrates the power of our virtual-machine technology and the caliber of our research group," said Zheng Bu, Senior Director of Research. "Our Multi-Vector Virtual ExecutionTM (MVX) engine offers a new and more sophisticated approach toward threat protection that can verify the existence and root cause of exploits before they are able to cause catastrophic damage."

 

Zero-day flaws are especially dangerous because of their ability to evade detection from traditional and next-generation firewalls, intrusion prevention systems, anti-virus, and Web gateways, leaving gaping holes in network defenses. As a result, the potential for loss and theft of customer information, intellectual property, and confidential information increases.

"The newest generation of cybercriminals are persistent, exploiting zero-day vulnerabilities that often leave security experts unaware of the holes in their networks until the damage has already been done," said Ashar Aziz, FireEye Founder and CTO. "To fill in the gap in network defenses, the FireEye technology is able to monitor both inbound and outbound attacks, identifying and blocking the activities of today's most advanced cyber attacks."

The seven zero-day flaws discovered by FireEye this year are:

CVE-2012-4792, Internet Explorer: Allowed remote attackers to execute arbitrary code via a crafted website that triggers access to an object that was not properly allocated or was deleted.

CVE-2013-0422, Java: Retrieved a template from the Web and created a full screen window demanding payment using some kind of social engineering scheme to scare the victim.

CVE-2013-0634, Flash: Allowed remote attackers to execute arbitrary code or caused a denial of service (memory corruption) via crafted SWF content.

CVE-2013-0640, CVE-2013-0641, PDF: Designed to trick Windows users into clicking on a malicious PDF file delivered in an email message.

CVE-2013-1493, Java: Allowed successful unauthenticated network attacks via multiple protocols, which resulted in unauthorized operating system takeover including arbitrary code execution.
CVE-2013-1347, Internet Explorer: Allowed remote attackers to execute arbitrary code via a crafted website that triggered access to an object that was not properly allocated or was deleted.

Best Mobiles in India

Read More About: fireeye hackers news

Best Phones

Get Instant News Updates
Enable
x
Notification Settings X
Time Settings
Done
Clear Notification X
Do you want to clear all the notifications from your inbox?
Yes No
Settings X
X