Risk
1/31/2011
01:09 PM
50%
50%

Windows Faces Zero Day MHTML Vulnerability

Microsoft releases temporary fix for bug that allows attackers to run malicious scripts on a user's computer via Internet Explorer.

Top 10 Microsoft Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Microsoft Stories Of 2010

Microsoft released a security advisory warning on Friday that Windows is susceptible to exploits that target a bug in the MHTML protocol. Attackers could use the vulnerability to execute client-side scripts that spoof content or steal data.

"The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document," Microsoft said. All supported versions of Windows are affected, except for Windows Server 2008 when installed using the Server Core option.

The vulnerability was first detailed 10 days ago on the WooYun.org Web site, and proof-of-concept code for exploiting the bug has been released. Microsoft, however, said it has yet to see any active attacks that use the exploit.

Interestingly, although the related exploit uses Internet Explorer to launch the attack, the version of IE is irrelevant, as the bug itself is in Windows.

Microsoft described the vulnerability as being similar to a server-side cross-site scripting (XSS) bug, in that attackers can inject malicious code into Web pages and bypass many types of security controls. Such bugs arise when Web applications serve pages containing content that hasn't been properly validated or "escaped," which means stripping out any special characters that an attacker could use to create an XSS attack. According to the Open Web Application Security Project (OWASP), XSS flaws are the most common type of Web application security vulnerability.

While Microsoft has yet to announce when it will release a full fix, it has detailed multiple client-side workarounds, including a registry tweak. On that front, it released a free fix-it tool, aimed at consumers or people who manage a small number of PCs, to automatically apply the suggested registry tweaks.

For larger environments, "I highly recommend you consider deploying the mitigation settings using Group Policy Objects (GPOs) as soon as possible," said Chester Wisniewski, a senior security advisor at Sophos Canada. "It will likely be some time before Microsoft is able to release a patch for this vulnerability and this is one of the cases where it is likely worth the effort to implement the mitigations."

Meanwhile, Microsoft is also working on a server-side fix with a number of Internet service providers, including Google.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.