US-CERT recommends users and administrators review theMicrosoft Security Advisoryand apply the recommended workarounds.

Meanwhile in a separate report,McAfeehas said that this zero-day exploit is a part of theSandworm.

The Operation Sandworm was discovered by iSIGHT Partners and allocated CVE-2014-4114.

All Windows versions except Windows 2003 vulnerable to a new Sandworm exploit

However, Microsoft apparently botched up the patch released for the original Operation Sandworm zero-day exploit, the CVE-2014-4114.

The botch up revealed another zero-day which is now identified as CVE-2014-6352.

In other words, attackers might still be able to exploit the vulnerability even after the patch is applied.

spot_img

Since then we have actively worked with Microsoft to clear this jam.

Preparing EMET requires adding a new configuration file to the standard one.

source: www.techworm.net