{"id":8933,"date":"2012-12-29T16:49:23","date_gmt":"2012-12-29T22:49:23","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=8933"},"modified":"2012-12-29T16:49:46","modified_gmt":"2012-12-29T22:49:46","slug":"microsoft-investigating-new-ie-vulnerability-used-in-targeted-attacks-ie9-and-ie10-users-are-safe","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=8933","title":{"rendered":"Microsoft investigating new IE vulnerability used in targeted attacks, IE9 and IE10 users are safe"},"content":{"rendered":"<blockquote><p>The malicious JavaScript in question only served the exploit code to browsers whose language was either English (U.S.), Chinese (China), Chinese (Taiwan), Japanese, Korean, or Russian. Once the initial checks passed, the JavaScript proceeded to load an Adobe Flash file named \u201ctoday.swf.\u201d This file ultimately triggered a heap spray in IE and downloaded a file named \u201cxsainfo.jpg.\u201d<\/p>\n<p>More details of the vulnerability are available at the CERT Knowledgebase (<a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/154201\"> VU#154201<\/a>). Here\u2019s the full technical description:<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/thenextweb.com\/microsoft\/2012\/12\/29\/criminals-use-adobe-flash-and-new-ie-vulnerability-in-targeted-attacks-ie9-and-ie10-users-are-safe\/\">Microsoft investigating new IE vulnerability used in targeted attacks, IE9 and IE10 users are safe &#8211; The Next Web<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The malicious JavaScript in question only served the exploit code to browsers whose language was either English (U.S.), Chinese (China), Chinese (Taiwan), Japanese, Korean, or Russian. Once the initial checks passed, the JavaScript proceeded to load an Adobe Flash file &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=8933\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[427,50,655],"class_list":["post-8933","post","type-post","status-publish","format-standard","hentry","category-technical","tag-exploit","tag-microsoft","tag-web-browsers"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/8933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8933"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/8933\/revisions"}],"predecessor-version":[{"id":8934,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/8933\/revisions\/8934"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8933"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}