Vulnerabilities / Threats
9/18/2013
09:41 AM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft: Beware IE Zero-Day Attacks

Microsoft offers temporary fix for security flaw in most versions of Internet Explorer, but doesn't yet have a patch to stop attackers from remotely executing code.

20 Great Ideas To Steal In 2013
20 Great Ideas To Steal In 2013
(click image for larger view)
Internet Explorer users, watch where you browse.

Microsoft issued that warning Tuesday after spotting some in-the-wild attacks targeting a new bug in IE. "There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9, although the issue could potentially affect all supported versions" -- meaning also Internet Explorer versions 6, 7, 10 and 11 -- said Dustin Childs, a group manager for communications in Microsoft's Trustworthy Computing group, in a blog post.

"We are actively working to develop a security update to address this issue," Childs said, though he provided no timeline for when that might happen.

[ Could crowdsourcing help in instances like this? Read HP Portal Crowdsources Security Threat Intelligence. ]

According to Microsoft security engineer Neil Sikka, the IE bug (CVE-2013-3893) that attackers have been exploiting enables them to bypass the address space layout randomization (ASLR) attack-blocking feature built into newer versions of IE, and gain the ability to remotely execute code. "The exploit was attacking a 'use after free' vulnerability in IE's HTML rendering engine (mshtml.dll) and was implemented entirely in JavaScript -- no dependencies on Java, Flash etc. -- but did depend on a Microsoft Office DLL, which was not compiled with ASLR enabled," Sikka said in a blog post.

Microsoft's related security advisory said the most likely mode of exploitation would be for attackers to host malicious websites or else submit "specially crafted content that could exploit this vulnerability" to third-party- sites that accept "user-provided content or advertisements." Accordingly, Microsoft said to beware of any links of unknown origin that might arrive via email, instant messaging or social networks, since they might lead to a site designed to exploit the vulnerability.

Related attacks, if successful, would give attackers' code "the same user rights as the current user," meaning they might be able to "install programs; view, change, or delete data; or create new accounts with full user rights." Accordingly, attackers might be able to do less damage against non-administrator or relatively locked-down user accounts.

Not all types of IE are at risk from exploits of this bug. According to Microsoft's security advisory, by default, Internet Explorer on Windows Server 2003, 2008, 2008 R2, 2012, and 2012 R2 runs in a restricted mode, known as "enhanced security configuration," which mitigates the vulnerability. Likewise, by default all "supported" versions of Microsoft Outlook, Microsoft Outlook Express and Windows Mail open any received HTML in a restricted zone, which would also mitigate the vulnerability.

How can businesses protect themselves? Microsoft has released a temporary "fix it" solution for 32-bit versions of Internet Explorer that it's calling the MSHTML Shim Workaround. "This Fix it solution is not intended to be a replacement for any security update. We recommend that you always install the latest security updates," according to Microsoft's security advisory. "However, we offer this Fix it solution as a workaround option for some scenarios," such as the current one, in which Microsoft has yet to patch the flaw that's being exploited. For this workaround to work, however, a PC must first have installed a cumulative security update for IE released on Sept. 10 by Microsoft.

Microsoft's Sikka said that the company's Enhanced Mitigation Experience Toolkit (EMET) -- version 3.0 or 4.0 -- can also be used to help prevent related exploits from being successful. This approach, notably, will work not only with 32-bit but also 64-bit versions of IE.

Tuesday's Fix It release was the first time in four months that Microsoft has had to release an emergency workaround for a flaw that's being actively exploited by attackers, said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

But are the EMET or Fix It mitigation strategies worth the effort? For business users, the answer is yes, said Wisniewski. But consumers might spare themselves the hassle, and instead adopt a simpler -- perhaps temporary, perhaps not -- fix. "My advice for non-corporate PCs is to simply use another browser until Microsoft is able to deliver a fix," he said.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
David F. Carr
50%
50%
David F. Carr,
User Rank: Apprentice
9/18/2013 | 4:29:53 PM
re: Microsoft: Beware IE Zero-Day Attacks
If the flaw was in an Office module, why aren't they telling people to update Office as well?
Mathew
50%
50%
Mathew,
User Rank: Apprentice
9/19/2013 | 3:17:00 PM
re: Microsoft: Beware IE Zero-Day Attacks
Unfortunately, updating Office won't help. The bug exists in an Office DLL that's in IE. Ironically, Microsoft in 2011 issued a report warning that only 20% of tested products -- including Microsoft software -- fully implemented ASLR. If Microsoft had followed its own advice, related attacks against this bug wouldn't have been possible.

Instead, Websense -- which studied real-world IE usage patterns -- said Wednesday that up to 70% of enterprise users are now at risk of being exploited by attacks that target this vulnerability.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant