<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29108#M21290</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update is ready to dwonload!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Apr 2014 20:40:15 GMT</pubDate>
    <dc:creator>_slv_</dc:creator>
    <dc:date>2014-04-28T20:40:15Z</dc:date>
    <item>
      <title>New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29104#M21286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Id like to share with You (sad) news about IE &lt;A href="http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html" title="http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html"&gt;http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and response from Microsoft &lt;A href="https://technet.microsoft.com/library/security/2963983" title="https://technet.microsoft.com/library/security/2963983"&gt;https://technet.microsoft.com/library/security/2963983&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is probably will be first issiue on Windows XP that will be never patched.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are wating for 433 Thread prevention update ... I hope it will be realeased soon as a emergency update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 09:09:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29104#M21286</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-04-28T09:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29105#M21287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Coverage to be provided in version 433&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Renato &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 15:37:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29105#M21287</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2014-04-28T15:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29106#M21288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Possible Emergency update. Will update thread accordingly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 19:06:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29106#M21288</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2014-04-28T19:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29107#M21289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Indeed it is&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 19:49:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29107#M21289</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-04-28T19:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29108#M21290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update is ready to dwonload!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 20:40:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29108#M21290</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-04-28T20:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29109#M21291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;slv wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Id like to share with You (sad) news about IE &lt;A class="jive-link-external-small" href="http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html"&gt;http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;and response from Microsoft &lt;A class="jive-link-external-small" href="https://technet.microsoft.com/library/security/2963983"&gt;https://technet.microsoft.com/library/security/2963983&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is probably will be first issiue on Windows XP that will be never patched.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are wating for 433 Thread prevention update ... I hope it will be realeased soon as a emergency update.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Slawek&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to point out that you can move towards mitigating this, even on XP, by installing EMET on your PC (&lt;A href="http://support.microsoft.com/kb/2458544"&gt;http://support.microsoft.com/kb/2458544&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows you to "sandbox" critical processes (in this case, IE) from being exploited by this bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's not perfect, but coupled with the content release by PA, you can certainly minimise your risk should you be in a position (like me) where you simply can't get rid of XP (completely) for whatever reason.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2014 01:42:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29109#M21291</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2014-04-29T01:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29110#M21292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Palo Alto newbie here.&amp;nbsp; If the signature has been downloaded and installed(we have threat prevention) with the default action of reset-client, does that mean my "inside" machines are protected from the exploit?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Apr 2014 20:57:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29110#M21292</guid>
      <dc:creator>ICarder</dc:creator>
      <dc:date>2014-04-30T20:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29111#M21293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ICarder,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, if the default action is "reset-client", then PAN firewall will drop the connection and end &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;machines are protected from the exploit&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Apr 2014 22:46:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29111#M21293</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-04-30T22:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29112#M21294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So how can you identify if the zero day is in your network? What is the remidiation for it and does the PA just alert for it or remove it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2014 13:10:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29112#M21294</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-05-01T13:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29113#M21295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As soon as PAN firewall will identify the signature of that packet, it will reset &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;send TCP RST) the connection &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;drop the collection). &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Also you&lt;/SPAN&gt; will be able to see the same information under threat logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 May 2014 03:22:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29113#M21295</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-02T03:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29114#M21296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Microsoft made a patch for XP &lt;A class="loading" href="http://blogs.technet.com/b/microsoft_blog/archive/2014/05/01/updating-internet-explorer-and-driving-security.aspx" title="http://blogs.technet.com/b/microsoft_blog/archive/2014/05/01/updating-internet-explorer-and-driving-security.aspx"&gt;http://blogs.technet.com/b/microsoft_blog/archive/2014/05/01/updating-internet-explorer-and-driving-security.aspx&lt;/A&gt; for this 0-day!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 May 2014 09:34:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29114#M21296</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-05-03T09:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: New Zero-Day Exploit targeting IE9-11 CVE-2014-1776</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29115#M21297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd like to create a custom app-ID signature to allow me to block all use of IE on the network... I'm having trouble with the regex for the user-agent string... anyone care to help? :smileyblush:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 May 2014 16:27:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-zero-day-exploit-targeting-ie9-11-cve-2014-1776/m-p/29115#M21297</guid>
      <dc:creator>CoreySteele</dc:creator>
      <dc:date>2014-05-03T16:27:20Z</dc:date>
    </item>
  </channel>
</rss>

