Vulnerabilities / Threats
9/24/2012
10:32 AM
50%
50%

Microsoft IE Patch Fixes Flaw Under Active Attack

Microsoft wins praise for quickly addressing five remote-execution security vulnerabilities, one of which is being used now in attacks.

8 Key Differences Between Windows 8 And Windows RT
8 Key Differences Between Windows 8 And Windows RT
(click image for larger view and for slideshow)
As promised, Microsoft Friday released a security update to patch a zero-day vulnerability that's being actively exploited by attackers, as well as four previously undisclosed vulnerabilities of a similar nature.

According to Microsoft's critical security update, Internet Explorer 6, 7, 8, and 9, running on almost every type of Windows operating system, are vulnerable to a remote code execution attack. A related exploit, if successful, would allow an attacker to execute arbitrary code on a targeted machine. Notably, however, IE10 and some versions of Windows Server aren't vulnerable to the related attack.

Numerous security experts have recommended that all IE users immediately install Microsoft's patch. "We recommend installing the update as soon as possible, even if you are not running one of the configurations that are currently being exploited, i.e. Internet Explorer plus Flash or version Java v1.6," said Wolfgang Kandek, CTO of Qualys, in a blog post.

According to a technical analysis of the vulnerability published by Microsoft, attackers have so far only exploited the flaw via browser plug-ins. "All real attacks we have seen are targeting only 32-bit versions of Internet Explorer, and rely on third-party browser [plug-ins] to either perform efficient heap-spray in memory and/or to bypass the built-in mitigations of Windows Vista and 7 such as DEP and ASLR," according to the post. For example, some versions of the attack code that target Java 6--which lacks ASLR--aren't effective against Java 7.

[ What are the legal rules when it comes to cyber attacks? Read Cyber Warfare Still Poses Legal Questions. ]

But Kandek warned that as attackers gain familiarity with the vulnerability, they may develop more effective exploits. "Attackers are surely working on [ways] to exploit the vulnerability directly, without the help of plug-ins," he said.

The vulnerability being exploited via in-the-wild attacks was disclosed on September 16 by researcher Eric Romang, who said he'd found it just two days prior, while examining code on an Italian website that was used--apparently by the gang behind the Nitro malware--to launch a number of recent, targeted attacks. Romang warned that attackers may have been employing the zero-day vulnerability for some time, prior to his spotting it.

After Romang's disclosure, the IE vulnerability was quickly verified by researchers at AlienVault Labs, which also found related command-and-control servers for the malware being hosted in Astoria, Ill. It said that the vulnerability was apparently being used to infect targeted PCs with the Poison Ivy remote access toolkit.

Last week, meanwhile, the vulnerability was also added as a working exploit to the Metasploit open source penetration testing toolkit, which allows security researchers--or potentially, attackers--to test the vulnerability for themselves.

The speed of Microsoft's patch response--just one week elapsed from public disclosure of the vulnerability to Microsoft releasing a fix--has earned the company plaudits from information security experts. "In my opinion, computer users should be grateful for Microsoft's response. They managed to create, test, and roll out a patch for the Internet Explorer security [vulnerability] Romang discovered being exploited by malicious hackers within a week," said Graham Cluley, senior technology consultant at Sophos, in a blog post.

Interestingly, however, Microsoft's security bulletin doesn't credit Romang with having reported the vulnerability in question. Rather, it thanks TippingPoint, which suggests that Microsoft may have first learned of the vulnerability from a different source, and prior to Romang's disclosure.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
johnitguru
50%
50%
johnitguru,
User Rank: Apprentice
10/5/2012 | 12:47:51 PM
re: Microsoft IE Patch Fixes Flaw Under Active Attack
I got tired of Microsoft viruses, scams and malware so I installed a really cool 3D Linux operating system for only $39.95 that is 100% compatible with all my Windows data and is 10 times faster called Robolinux.
It took me only 5 minutes to install it.

Now I can surf until I am blue in the face and I can't get a virus.

Check it out

http://robolinux.org
johnitguru
50%
50%
johnitguru,
User Rank: Apprentice
10/5/2012 | 12:47:35 PM
re: Microsoft IE Patch Fixes Flaw Under Active Attack
I got tired of Microsoft viruses, scams and malware so I installed a really cool 3D Linux operating system for only $39.95 that is 100% compatible with all my Windows data and is 10 times faster called Robolinux.
It took me only 5 minutes to install it.

Now I can surf until I am blue in the face and I can't get a virus.

Check it out

http://robolinux.org
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.