30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

p. 143<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

VULNERABILITy TRENDS<br />

Figure D.5. Zero-day Vulnerabilities Identified in 2012<br />

Source: Symantec<br />

CVE Detail<br />

cVe-2012-0003 Microsoft Windows Media Player “winmm.dll” MiDi File Parsing remote Buffer Overflow Vulnerability<br />

cVe-2012-0056 Linux Kernel cVe-2012-0056 Local Privilege escalation Vulnerability<br />

cVe-2012-0507 Oracle Java se remote Java runtime environment code execution Vulnerability<br />

cVe-2012-0767 Adobe Flash Player cVe-2012-0767 cross site scripting Vulnerability<br />

cVe-2012-0779 Adobe Flash Player cVe-2012-0779 Object type confusion remote code execution Vulnerability<br />

cVe-2012-1535 Adobe Flash Player cVe-2012-1535 remote code execution Vulnerability<br />

cVe-2012-1856 Microsoft Windows common controls ActiveX control cVe-2012-1856 remote code execution Vulnerability<br />

cVe-2012-1875 Microsoft <strong>internet</strong> explorer cVe-2012-1875 same iD Property remote code execution Vulnerability<br />

cVe-2012-1889 Microsoft XML core services cVe-2012-1889 remote code execution Vulnerability<br />

cVe-2012-4792 Microsoft <strong>internet</strong> explorer “cDwnBindinfo” use-After-Free remote code execution Vulnerability<br />

cVe-2012-4969 Microsoft <strong>internet</strong> explorer image Arrays use-After-Free remote code execution Vulnerability<br />

cVe-2012-5076 Oracle Java se cVe-2012-5076 remote Java runtime environment Vulnerability<br />

cVe-MAP-nOMAtcH Parallels Plesk Panel unspecified remote <strong>security</strong> Vulnerability<br />

cVe-MAP-nOMAtcH Microsoft Windows Digital certificates spoofing Vulnerability<br />

Commentary<br />

• 2012 sees an increase in number of zero-day vulnerabilities<br />

compared to 2011. There was a 75 percent increase in<br />

vulnerabilities seen in 2012 compared with 2011. However,<br />

the number of vulnerabilities seen in 2012 was inflated due<br />

to Microsoft file-based vulnerabilities whereas Adobe basedvulnerabilities<br />

total up to three compared to four in 2011,<br />

when they topped the chart.<br />

• There were three zero-day browser vulnerabilities seen in<br />

2012, an increase of 2 from 2011. This corresponds with<br />

the dramatic increase in browser vulnerabilities compared<br />

to the total seen in 2011. With the trend moving into<br />

Web attacks, more and more browser vulnerabilities are<br />

leveraged by the attackers.<br />

• While the overall number of zero-day vulnerabilities is up,<br />

attacks using these vulnerabilities continue to be successful.<br />

Some of these vulnerabilities are leveraged in targeted<br />

attacks. Adobe Flash Player and Microsoft Windows ActiveX<br />

Control vulnerabilities are widely used in targeted attacks,<br />

and vulnerabilities in Microsoft technologies accounted for<br />

almost 50 percent of the zero-day vulnerabilities seen in<br />

2012.<br />

• Most of the attack scenarios are planned in such a way that<br />

an attacker crafts a malicious Web page to leverage the issue<br />

and uses email or other means to distribute the page and<br />

entices an unsuspecting user to view it. When the victim<br />

views the page, the attacker-supplied code is run.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!