Microsoft Patches IE Security Vulnerability

Microsoft has issued an emergency fix to patch the Internet Explorer vulnerability at the centre of a spate of cyber-attacks against Google, Adobe Systems and dozens of other companies.

The update actually addresses a total of eight vulnerabilities in IE, the most serious of which can be exploited for remote code execution. The flaw at the centre of the cyber-attack on Google is CVE-2010-0249.

According to new findings from Symantec, the fix comes as a new exploit targeting the vulnerability has begun to make the rounds on the Internet.

“The new exploit is being hosted on hundreds of websites and Symantec detects the malicious HTML pages as Trojan.Malscript!html,” said Josh Talbot, security intelligence manager for Symantec Security Response. “The pages contain a shell code that bypasses a warning dialog shown after downloaded file gets executed. The page replaces the code of ‘MessageBeep API’ so that the Internet Explorer process which attempts to play a beep sound will be terminated.

“After the termination of the process, it causes the Internet Explorer window to be displayed again,” Talbot continued. “The shell code also contains code to avert API hooking when it calls APIs. By doing this, some security products may miss some monitored APIs.”

In the end, a malicious file is downloaded, Symantec reported.

Though Microsoft noted that some of its other applications use mshtml.dll as a rendering engine and could be used as an attack vector if they allow active scripting, the company said the IE update closes down all known attack vectors.

Six of the vulnerabilities are memory corruption flaws. The remaining two include a cross-site scripting filter-handling vulnerability and a URL validation vulnerability.

“According to the Microsoft Security Research & Defense team, this update also addresses the DEP bypass vulnerability made public yesterday, which exists in all current versions of Internet Explorer,” said Don Leatham, senior director of business development at Lumension. “If not bypassed, DEP can help in stopping the exploit code. Newer versions of Internet Explorer running on Windows Vista and Windows 7 are less vulnerable.

“These versions of Windows have Address Space Layout Randomization (ASLR) that provides an extra level of protection beyond DEP,” Leatham added. “This is a clear, real-world example of the superior security model implemented in Windows Vista and Windows 7, and should be a wake-up call to organisations still running Windows XP to accelerate their migration plans.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

ASML, Others Outline Impact Of Trump’s Tariffs

Chip making giant ASML mirrors other equipment makers, and outlines financial impact of Donald Trump's…

31 mins ago

AI in Cybersecurity: Double-Edged Sword or Game-Changer?

AI is transforming cybersecurity, offering faster defence and smarter attacks. Learn how businesses can harness…

4 hours ago

Google Sued In UK For Online Search Domination

Search engine giant being sued for £5 billion ($6.64 billion) damages over allegations for online…

4 hours ago

Nvidia Expects $5.5 Billion Hit As US Tightens Export Controls

H20 chip designed for Chinese market now requires special export licence, as Trump Administration tightens…

4 hours ago

Apple ‘Developing’ Two Vision Pro Headset Successors

Apple reportedly working on lighter, cheaper Vision Pro, another model that links directly to Mac…

1 day ago

OpenAI Releases GPT-4.1 With Improved Coding

OpenAI says GPT-4.1 model family can understand prompts with up to 1 million tokens, features…

1 day ago