Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:51 PM
Connect Directly

Zero-Day Microsoft Vulnerabilities Being Exploited

Web sites have been found with malicious JavaScript code that attempts to exploit a vulnerability in Internet Explorer 7.

Two zero-day vulnerabilities in Microsoft software are being actively exploited.

Even as it issued its December series of security bulletins on Tuesday, Microsoft warned in a separate security advisory that it was investigating reports of a vulnerability in the WordPad Text Converter for Word 97 files on systems using Windows 2000 SP4, Windows XP SP2, or Windows Server 2003 SP1 or SP2.

"At this time, we are aware only of limited and targeted attacks that attempt to use this vulnerability," Microsoft said, characterizing the risk as limited.

But on Wednesday, a new problem arose. Proof-of-concept exploit code for a different vulnerability, an XML parsing bug in Internet Explorer, was posted on Milw0rm.com.

The advisory Microsoft issued about this attack on Wednesday sounds much like the one it issued on Tuesday. "At this time, we are aware only of limited attacks that attempt to use this vulnerability," Microsoft said. It warned of attacks against Windows Internet Explorer 7 on Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Windows Vista and SP1, and Windows Server 2008.

This isn't the first time vulnerabilities have appeared just after Microsoft's regularly scheduled patch day. It's a trend that appears to represent an effort to take advantage of the rigidity of Microsoft's patch process and to maximize the useful lifespan of exploits.

Trend Micro reports that several Web sites have been found with malicious JavaScript code that attempts to exploit the IE vulnerability. "This script exploits this zero-day vulnerability in Internet Explorer, through a Heap Spray on SDHTML," the company said on its Web site. "It also checks for the IE version installed on the affected system, since this exploit targets IE7."

Trend Micro says that the toolkit related to this exploit is being sold in the Chinese underground community and that files associated with this attack have been designed to steal information such as online gaming credentials.

According to Virustotal, a file analysis service, only 20 out of 38 listed antivirus applications detected the information-stealing malware.

Trend Micro also says that victims of this attack could become infected with a rootkit.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts
Jai Vijayan, Contributing Writer,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-11
Tableau Server 10.3 through 2019.4 on Windows and Linux allows XSS via the embeddedAuthRedirect page.
PUBLISHED: 2019-12-11
Yabasic 2.86.1 has a heap-based buffer overflow in the yylex() function in flex.c via a crafted BASIC source file.
PUBLISHED: 2019-12-11
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
PUBLISHED: 2019-12-11
The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute.
PUBLISHED: 2019-12-11
MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page.