{"id":3442,"date":"2013-01-03T11:51:21","date_gmt":"2013-01-03T11:51:21","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3442"},"modified":"2015-09-09T19:36:55","modified_gmt":"2015-09-09T11:36:55","slug":"microsoft-rushes-out-fix-it-for-internet-explorer-0-day-exploit","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2013\/01\/microsoft-rushes-out-fix-it-for-internet-explorer-0-day-exploit\/","title":{"rendered":"Microsoft Rushes Out ‘Fix It’ For Internet Explorer 0-day Exploit"},"content":{"rendered":"

Pretty unusual for Microsoft but they’ve rushed out a fast fix for a 0-day Internet Explorer vulnerability which allows remote code execution and malware dropping. It doesn’t effect the latest version of Internet Explorer (9) but it effects all the common previous versions (6, 7 & 8) – which still accounts for the majority of users.<\/p>\n

It is definitely important though, so I can appreciate their urgency. The sad part is most people that will fall for the scam sites that push out such malware won’t know about this patch, so they will remain at risk.<\/p>\n

It will help a lot for corporates though managing the entire organization security as many are mandated to use Internet Explorer, and try and keep it secure..<\/p>\n

Microsoft has pushed out a temporary fix to defend against a zero-day vulnerability that surfaced in attacks launched last week.<\/p>\n

The security flaw (CVE-2012-4792) – which affects IE 6, 7 and 8 but not the latest versions of Microsoft’s web browser software – allows malware to be dropped onto Windows PCs running the vulnerable software, providing, of course, that users can be tricked into visiting booby-trapped websites.<\/p>\n

Redmond has released a temporary Fix It (easy-to-apply workaround) pending the development of a more comprehensive patch.<\/p>\n

The flaw was initially discovered by security tools firm FireEye on the Council on Foreign Relations website on 27 December.<\/p><\/blockquote>\n