Categories: SecurityWorkspace

Microsoft’s Internet Explorer Zero-Day Fix Broken ‘With Ease’

Just days after Microsoft issued a workaround solution to stop attackers exploiting a zero-day vulnerability in Internet Explorer, researchers have shown how easy it is to get around the supposed fix.

Microsoft rushed out a Fix It tool this week to prevent hackers from exploiting a previously unknown memory corruption flaw in IE versions 6, 7 and 8, which hackers have used to carry out watering hole attacks. In this kind of attack, hackers add malicious code to webpages they know their targets frequent.

Undoing the Internet Explorer fix

But that fix has been circumvented by researchers at Exodus Intelligence, a vulnerability specialist formed by ex-employees of the Zero-Day Initiative. Aaron Portnoy, co-founder and vice-president of research at Exodus, told TechWeekEurope it took less than a day’s work to get around the fix and exploit the flaw.

“It was quite easy for our resident browser pwner, Peter Vreugdenhil,” Portnoy said. “It is quite urgent Microsoft patch this issue given the fact that it is being actively exploited, exploits are publicly available in Metasploit, and as we’ve discovered, their “Fix It” patch is broken.

“We’ll be withholding details until Microsoft releases an official patch. It’s likely that this variation might end up in Metasploit after we release details (although perhaps someone else will investigate the bypass independently now that we’ve mentioned it is possible).”

Exodus will be informing its customers on how it carried out the exploit, however.

Microsoft had not responded to a request for comment at the time of publication.

The tech giant announced it Patch Tuesday list of fixes today, which did not include cover for the Internet Explorer flaw.

The Internet Explorer zero-day was used to compromise US-based think-tank Council on Foreign Relations. Capstone Turbine, a US micro-turbine manufacturer, was also targeted.

Security firm Symantec believes the hackers exploiting the flaw have significant funding and are running a highly-sophisticated operation.

“In this particular case, use of a zero-day exploit suggests a high level of sophistication requiring access to resources and skills which would normally be outside most hackers’ capabilities,” it wrote in a blog post.

How well do you know Internet security? Try our quiz and find out!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

3 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

3 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

3 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago