Risk
9/21/2012
12:03 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Microsoft Patches IE Bug

Microsoft plans to issue a patch Friday to deal with the latest in a barrage of zero-day exploits for Internet Explorer.

Following security researcher Eric Romang's September 16 discovery of an Internet Explorer (IE) zero-day exploit, Microsoft, which officially acknowledged the vulnerability the next day and later offered a workaround, is set to deploy a patch on Friday. The remedy will arrive via Windows Update and is set to unroll around 10 a.m. Pacific Time. The company is hosting a live, online Q&A at noon to address any concerns.

The security fix caps a busy few weeks for Microsoft's security teams. Earlier, the company generated moderate controversy when it initially said an exploit in Internet Explorer 10 would not be addressed until after the browser begins shipping with Windows 8 at the end of October. Microsoft later reversed the decision.

The new security risk affects IE versions 6,7, 8, and 9, and can allow attackers to seize control of a victim's computer. Citing StatCounter, security firm Rapid 7, which "strongly" suggested avoiding the Microsoft browser until a fix was offered, noted that around two-fifths of North American Internet users, and one-third of users worldwide, are susceptible to attack. Concern was so widespread in some corners that the German government discouraged the use of afflicted IE versions.

[ For more on the IE 9 zero-day exploit, see Microsoft Warns Of IE 9 Security Bug. ]

Despite the aggressive fears, nCircle's Andrew Storm said in an interview that "there's been a lot of discussion, but it hasn't panned out to be an Internet pandemic." He noted that the malware seems intended for targeted attacks and that instances in the wild have so far been fairly limited.

Evidence suggests the malware originated in China, information that, along with a recent Symantec report, suggests well-funded organizations within the country--and perhaps even the government itself--are issuing cyber-attacks.

Storm said such speculation probably has "some truth behind it" but countered that definitive proof might not emerge any time soon. "Right now, we have to guess quite a bit about what's going on," he asserted, noting that governments are unlikely to admit to such activities.

Storm also said it's difficult to determine what the malware authors intended, as once word got out, the creators had to shelf their plans.

He lauded Microsoft's quick solution, remarking that it's come much quicker than anyone expected. He noted, however, that the company recently committed to doubling the resources dedicated to IE testing. "Given that statement," he stated," it's not surprising they were able to rush [an update] out."

Ryan Eldridge is co-founder of Nerds on Call, which he said repairs zero-day exploits on around 1,500 computers every week. Like Rapid7, Eldridge's company discouraged users from using IE until the vulnerability had been addressed. In an interview, he explained that such caution is wise because "the exploit will live on the Internet pretty much forever," noting that users who run unpatched browsers "will be toast."

He echoed Storm's assertion that the attackers have so far pursued specific goals rather than widespread mischief. Still, he cautioned, "Once [the exploit] starts getting into the wild, other groups get hold of it and turn it to their own nefarious means." Indeed, with the vulnerability already integrated into Rapid7's Metasploit testing tool, the duplicitous code is available to those who want it.

Microsoft's next browser could mitigate security concerns. Following Chrome's lead, it will bundle Flash and its updates directly into IE 10, reducing the number of individual steps users must complete to protect their systems.

Regarding this decision, Storm said, "Microsoft had to do it," noting that Chrome's approach has included successes such as fixing Flash bugs "before Adobe's even released a patch."

Eldridge sees the Flash integration as a positive step. Microsoft has absorbed criticism for automating updates in the past, he noted, since some feel that "users should make that choice." Nonetheless, he stated that removing often-negligent users from aspects of the security maintenance process could benefit the Internet as whole.

InformationWeek is conducting a survey on mobile device management and security. Take our 2013 InformationWeek Mobile Device Management and Security Survey now. Survey ends Sept. 14.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5316
Published: 2014-09-21
Cross-site scripting (XSS) vulnerability in Dotclear before 2.6.4 allows remote attackers to inject arbitrary web script or HTML via a crafted page.

CVE-2014-5320
Published: 2014-09-21
The Bump application for Android does not properly handle implicit intents, which allows attackers to obtain sensitive owner-name information via a crafted application.

CVE-2014-5321
Published: 2014-09-21
FileMaker Pro before 13 and Pro Advanced before 13 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2319...

CVE-2014-5322
Published: 2014-09-21
Cross-site scripting (XSS) vulnerability in the Instant Web Publish function in FileMaker Pro before 13 and Pro Advanced before 13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-3640.

CVE-2014-6602
Published: 2014-09-21
Microsoft Asha OS on the Microsoft Mobile Nokia Asha 501 phone 14.0.4 allows physically proximate attackers to bypass the lock-screen protection mechanism, and read or modify contact information or dial arbitrary telephone numbers, by tapping the SOS Option and then tapping the Green Call Option.

Best of the Web
Dark Reading Radio