Varonis discovers Windows event log exploits
Data security and analytics company Varonis has discovered two new vulnerabilities in the Windows event log left behind from the legacy of the now-discontinued Internet Explorer.
The company has provided details of two proof-of-concept exploits including LogCrusher, which allows any domain user to remotely crash the Event Log application of any Windows machine on the domain.
Meanwhile, the OverLog exploit can be used to cause a remote denial-of-service attack by filling the hard drive space of any Windows machine on the domain, Varonis said.
While Microsoft has issued a partial patch for the exploits, LogCrusher can still be performed by attackers that gain access to a victim’s network.
Without logs, security controls are blind, and some security control products even attach themselves to the logger service, meaning taking down the service can disable the controls, Varonis warned. This could allow an attacker to use any type of usually detected exploit or attack with impunity.
Meanwhile, there remains potential for other user-accessible application Event Logs to be similarly leveraged for attacks, the company added.
CrowdStrike to buy Adaptive Shield
CrowdStrike is augmenting its SaaS security capabilities through the acquisition of Israeli-based...
LockBit named nastiest malware of 2024
LockBit, a ransomware malware known to have been used to attack Australian targets, has been...
Extreme Networks launches ZTNA solution
Extreme Networks' new ExtremeCloud Universal ZTNA solution combines cloud network access...