Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Zero-Day Bug Discovered In IE7

Vulnerability in the wild could allow attackers to control and steal data from remote PCs

An unpatched security vulnerability in Internet Explorer 7 is being actively exploited in the wild, and could allow attackers to control remote PCs and access personal information without the user's knowledge, security researchers say.

The vulnerability takes advantage of Internet Explorer's handling of specially crafted XML tags, which can leave the browser susceptible to a heap spray attack, according to researchers at ScanSafe. A successful exploit could result in the installation of a data theft Trojan with autorun worm capabilities, the company says.

Release of the exploit appears to be intentionally timed to fall after Patch Tuesday, when Microsoft typically issues patches for newly discovered vulnerabilities. The first exploits appeared just 48 hours after Microsoft made this month's patches available.

So far the zero-day "does not appear to be wildly used, but the code is publicly available," according to researchers at Qualys. Still, exploits that take advantage of IE7 -- which was supposed to have been Microsoft's "safer" browser -- are a concern, the researchers said.

"Zero-day exploits involving any widely used software are particularly concerning," says Mary Landesman, senior security researcher at ScanSafe. "When it impacts a browser as widely used as Internet Explorer, it can have serious implications. Predictably, attackers were very quick to add the IE7 exploit to their tool kit, and we anticipate these attacks will escalate over the coming weeks."

"The browser is the most popular vehicle for getting exploits on client machines with the ultimate goal of controlling the machine for monetary purposes," adds Wolfgang Kandek, CTO at Qualys. "It is more reliable for an attacker to exploit a server vulnerability -- where no human intervention is required -- but today, the Web browser is the 'killer application' that everybody uses and provides the biggest attack vector. Browsers are very complex and powerful programs and are very difficult to secure."

Two other zero-day vulnerabilities were discovered in the Microsoft environment this week. One impacts Microsoft SQL Server 2000 and is alleged to be remotely exploitable via SQL injection attacks. Unlike typical SQL injection attacks, which pose the greatest risk to site visitors, this particular attack would directly impact the server as well.

A third zero-day vulnerability has been reported in WordPad's text conversion feature. Microsoft has reported that there are "targeted attacks seeking to exploit this vulnerability" and released a patch for it on Tuesday.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
WannaCry Has IoT in Its Crosshairs
Ed Koehler, Distinguished Principal Security Engineer, Office of CTO, at Extreme Network,  9/25/2020
Safeguarding Schools Against RDP-Based Ransomware
James Lui, Ericom Group CTO, Americas,  9/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26120
PUBLISHED: 2020-09-27
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even witho...
CVE-2020-26121
PUBLISHED: 2020-09-27
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an uploa...
CVE-2020-25812
PUBLISHED: 2020-09-27
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
CVE-2020-25813
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
CVE-2020-25814
PUBLISHED: 2020-09-27
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> ...