So during the past weekend, Microsoft confirmed an Internet Explorer 0-day that is actually being used in targeted online attacks.
It’s pretty serious as it effects the whole family including Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11.
On Saturday, late in the evening, Microsoft issued a public advisory confirming the existence of a new vulnerability in Internet Explorer that’s being used in targeted attacks online.
The vulnerability was disclosed by researchers at FireEye, who observed attacks against Internet Explorer versions 9 though 11. While criminals seem to be focused on the later releases, all versions of Internet Explorer are affected.
Exploits leveraging the use-after-free vulnerability will bypass protections in ASLR and DEP and gain code execution privileges.
In a blog post, FireEye explains:
“Threat actors are actively using this exploit in an ongoing campaign which we have named Operation Clandestine Fox. However, for many reasons, we will not provide campaign details. But we believe this is a significant zero day as the vulnerable versions represent about a quarter of the total browser market. We recommend applying a patch once available.”
The focus does seem to be on IE9 and 11 (which would be the most commonly used versions on newer operating systems (Windows 7 & 8).
EMET will help Microsoft says..
I would expect them to be pushing out a patch for this ASAP as it’s a pretty serious flaw.
In addition, FireEye researchers stated the group responsible for this exploit has had access to “a select number of browser-based 0-day exploits in the past.”
Moreover, the group is proficient at lateral movement, and have been difficult to track as they rarely reuse command and control infrastructure.
Until a patch is released, Microsoft has said that EMET will help mitigate attacks against this flaw.
Further, versions of Internet Explorer running with the default Enhanced Security Configuration are not at risk, provided that the malicious website used to target the vulnerability isn’t listed in the Trusted sites zone.
This is typically the case for Internet Explorer on Windows Server 2003, Windows Server 2008 (and 2008 R2), and Windows Server 2012 (and 2012 R2).
Microsoft hasn’t said if they will release an out-of-cycle patch for this flaw, only that they’ll take the “appropriate action” once the investigation is completed.
The next Patch Tuesday is due almost two weeks from now on Tuesday 13th May 2014, so that’s a fair bit of exposure if this exploit goes public.
We shall have to wait and see what happens, knowing Microsoft – not a lot.
Source: Network World
- The Jeep HACK – What You Need To Know
- Dharma – Generation-based Context-free Grammar Fuzzing Tool
- Hacking Team Hacked – What You Need To Know
- 3Com’s TippingPoint Finds New IE Vulnerabilities
- Internet Explorer 7 (IE7) Vulnerability Hits the Streets
- Microsoft Confirms First Windows 7 0-Day Vulnerability
Most Read in Exploits/Vulnerabilities: