Categories: SecurityWorkspace

Microsoft’s Internet Explorer Zero-Day Fix Broken ‘With Ease’

Just days after Microsoft issued a workaround solution to stop attackers exploiting a zero-day vulnerability in Internet Explorer, researchers have shown how easy it is to get around the supposed fix.

Microsoft rushed out a Fix It tool this week to prevent hackers from exploiting a previously unknown memory corruption flaw in IE versions 6, 7 and 8, which hackers have used to carry out watering hole attacks. In this kind of attack, hackers add malicious code to webpages they know their targets frequent.

Undoing the Internet Explorer fix

But that fix has been circumvented by researchers at Exodus Intelligence, a vulnerability specialist formed by ex-employees of the Zero-Day Initiative. Aaron Portnoy, co-founder and vice-president of research at Exodus, told TechWeekEurope it took less than a day’s work to get around the fix and exploit the flaw.

“It was quite easy for our resident browser pwner, Peter Vreugdenhil,” Portnoy said. “It is quite urgent Microsoft patch this issue given the fact that it is being actively exploited, exploits are publicly available in Metasploit, and as we’ve discovered, their “Fix It” patch is broken.

“We’ll be withholding details until Microsoft releases an official patch. It’s likely that this variation might end up in Metasploit after we release details (although perhaps someone else will investigate the bypass independently now that we’ve mentioned it is possible).”

Exodus will be informing its customers on how it carried out the exploit, however.

Microsoft had not responded to a request for comment at the time of publication.

The tech giant announced it Patch Tuesday list of fixes today, which did not include cover for the Internet Explorer flaw.

The Internet Explorer zero-day was used to compromise US-based think-tank Council on Foreign Relations. Capstone Turbine, a US micro-turbine manufacturer, was also targeted.

Security firm Symantec believes the hackers exploiting the flaw have significant funding and are running a highly-sophisticated operation.

“In this particular case, use of a zero-day exploit suggests a high level of sophistication requiring access to resources and skills which would normally be outside most hackers’ capabilities,” it wrote in a blog post.

How well do you know Internet security? Try our quiz and find out!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

2 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

4 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

19 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

22 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

23 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

24 hours ago