Windows Zero Day / Duqu Exploit

0  comments

Last week a very significant, previously unidentified, Microsoft Windows flaw was announced. This specific flaw allows remote attackers to execute arbitrary code via crafted font data in Word documents. It is actively being exploited in the wild by the Duqu worm/trojan.

Considerations

  • Research vulnerability and known exploits/threats (see links below for a good start).
  • Triage the vulnerability (see Vulnerability Triage Process below if you don’t already have a method) to determine the appropriate threat mitigation strategy.
  • Communicate the potential risk and plan of attack to management (solicit feedback/approval).
  • Test workaround/mitigation strategy before deployment.
  • Adjust strategy (if necessary) and execute plan.

Vulnerability Research

Microsoft Technet

PCWorld

Exploit/Threat Research

Symantec Research

Wikipedia: Duqu

Vulnerability Triage Process

Cisco’s Vulnerability Risk Triage Model

 

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

You may also like:

Dedicated Vs. Non-Dedicated HIPAA Security Officer
What is a Dedicated and Non-Dedicated HIPAA Security Officer?
What are the primary responsibilities of a HIPAA Security Officer?
What is a HIPAA Security Officer?

Subscribe now to get the latest updates!

>