Vulnerabilities / Threats
5/9/2013
09:26 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Microsoft Issues Emergency Fix For IE Zero-Day

'Fix it' now available as a temporary defense until actual patch is ready; only IE 8 is affected by flaw

Microsoft has issued a temporary fix for a zero-day flaw in Internet Explorer that was used in recent attacks against the U.S. Department of Labor and other websites.

The workaround, which Microsoft calls a one-click Fix it tool, can be used to prevent known attacks exploiting the vulnerability. Microsoft once again confirmed that the bug affects only IE version 8; IE 6, 7, 9, and 10 are not affected.

"We have updated Security Advisory 2847140 with an easy one-click Fix it to help protect Internet Explorer 8 customers. Customers should apply the Fix it or follow the workarounds listed in the advisory to help protect against the known attacks while we continue working on a security update," said Dustin Childs, group manager of response communications for Microsoft Trustworthy Computing in a statement. "Internet Explorer 6, 7, 9 and 10 are not affected.”

The flaw was discovered by researchers investigating a waterhole-style attack on the Department of Labor's website. The attackers were using the DOL attack to turn around and target the U.S. Department of Energy, researchers say. According to Invincea, "the web pages that were compromised on the DoL site are intended for Dept of Energy employees (and their DoL representatives) in dealing with nuclear-related illnesses linked to Dept of Energy facilities and the toxicity levels at each location."

At least nine other websites were also targeted in the attack, including nonprofit organizations and a large European aerospace, defense, and a security company, according to Jaime Blasco, director of AlienVault research labs.

A Metasploit exploit pack is also available for the use-after-free bug that has been assigned as CVE-2013-1347.

Paul Ducklin, a security expert with Sophos, says a temporary patch is the best bet here since rushing out a permanent one for this flaw could break other things. "The problem with rushing out a permanent patch to this sort of bug is that there is a chance that by sealing off the flaw, you might break things that legitimate real-world websites rely on, and thus interfere with the workflow of some of your users," Ducklin said in a blog post today. "Even if the behaviour broken by your patch is a side-effect of the bug, and thus itself relies on broken behaviour, users don't like security "cures" that give the impression of being worse than the disease."

For Microsoft's Fix it to work, users must have April's patches installed and 32-bit versions of IE running. Microsoft's Enhanced Mitigation Experience Toolkit (EMET) combats attacks using this bug.

Microsoft's Fix it for the IE 8 flaw is available for download here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web