Vulnerabilities / Threats
5/9/2013
09:26 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Issues Emergency Fix For IE Zero-Day

'Fix it' now available as a temporary defense until actual patch is ready; only IE 8 is affected by flaw

Microsoft has issued a temporary fix for a zero-day flaw in Internet Explorer that was used in recent attacks against the U.S. Department of Labor and other websites.

The workaround, which Microsoft calls a one-click Fix it tool, can be used to prevent known attacks exploiting the vulnerability. Microsoft once again confirmed that the bug affects only IE version 8; IE 6, 7, 9, and 10 are not affected.

"We have updated Security Advisory 2847140 with an easy one-click Fix it to help protect Internet Explorer 8 customers. Customers should apply the Fix it or follow the workarounds listed in the advisory to help protect against the known attacks while we continue working on a security update," said Dustin Childs, group manager of response communications for Microsoft Trustworthy Computing in a statement. "Internet Explorer 6, 7, 9 and 10 are not affected.”

The flaw was discovered by researchers investigating a waterhole-style attack on the Department of Labor's website. The attackers were using the DOL attack to turn around and target the U.S. Department of Energy, researchers say. According to Invincea, "the web pages that were compromised on the DoL site are intended for Dept of Energy employees (and their DoL representatives) in dealing with nuclear-related illnesses linked to Dept of Energy facilities and the toxicity levels at each location."

At least nine other websites were also targeted in the attack, including nonprofit organizations and a large European aerospace, defense, and a security company, according to Jaime Blasco, director of AlienVault research labs.

A Metasploit exploit pack is also available for the use-after-free bug that has been assigned as CVE-2013-1347.

Paul Ducklin, a security expert with Sophos, says a temporary patch is the best bet here since rushing out a permanent one for this flaw could break other things. "The problem with rushing out a permanent patch to this sort of bug is that there is a chance that by sealing off the flaw, you might break things that legitimate real-world websites rely on, and thus interfere with the workflow of some of your users," Ducklin said in a blog post today. "Even if the behaviour broken by your patch is a side-effect of the bug, and thus itself relies on broken behaviour, users don't like security "cures" that give the impression of being worse than the disease."

For Microsoft's Fix it to work, users must have April's patches installed and 32-bit versions of IE running. Microsoft's Enhanced Mitigation Experience Toolkit (EMET) combats attacks using this bug.

Microsoft's Fix it for the IE 8 flaw is available for download here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

CVE-2014-3543
Published: 2014-07-29
mod/imscp/locallib.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via a package with a manifest file containing an XML external entity declaration in conjunction with an entity referenc...

CVE-2014-3544
Published: 2014-07-29
Cross-site scripting (XSS) vulnerability in user/profile.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to inject arbitrary web script or HTML via the Skype ID profile field.

CVE-2014-3545
Published: 2014-07-29
Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to execute arbitrary code via a calculated question in a quiz.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.