Categories: SecurityWorkspace

Microsoft’s Internet Explorer Zero-Day Fix Broken ‘With Ease’

Just days after Microsoft issued a workaround solution to stop attackers exploiting a zero-day vulnerability in Internet Explorer, researchers have shown how easy it is to get around the supposed fix.

Microsoft rushed out a Fix It tool this week to prevent hackers from exploiting a previously unknown memory corruption flaw in IE versions 6, 7 and 8, which hackers have used to carry out watering hole attacks. In this kind of attack, hackers add malicious code to webpages they know their targets frequent.

Undoing the Internet Explorer fix

But that fix has been circumvented by researchers at Exodus Intelligence, a vulnerability specialist formed by ex-employees of the Zero-Day Initiative. Aaron Portnoy, co-founder and vice-president of research at Exodus, told TechWeekEurope it took less than a day’s work to get around the fix and exploit the flaw.

“It was quite easy for our resident browser pwner, Peter Vreugdenhil,” Portnoy said. “It is quite urgent Microsoft patch this issue given the fact that it is being actively exploited, exploits are publicly available in Metasploit, and as we’ve discovered, their “Fix It” patch is broken.

“We’ll be withholding details until Microsoft releases an official patch. It’s likely that this variation might end up in Metasploit after we release details (although perhaps someone else will investigate the bypass independently now that we’ve mentioned it is possible).”

Exodus will be informing its customers on how it carried out the exploit, however.

Microsoft had not responded to a request for comment at the time of publication.

The tech giant announced it Patch Tuesday list of fixes today, which did not include cover for the Internet Explorer flaw.

The Internet Explorer zero-day was used to compromise US-based think-tank Council on Foreign Relations. Capstone Turbine, a US micro-turbine manufacturer, was also targeted.

Security firm Symantec believes the hackers exploiting the flaw have significant funding and are running a highly-sophisticated operation.

“In this particular case, use of a zero-day exploit suggests a high level of sophistication requiring access to resources and skills which would normally be outside most hackers’ capabilities,” it wrote in a blog post.

How well do you know Internet security? Try our quiz and find out!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Polestar Benefits From Targetting Disgruntled Tesla Owners – Report

Executive at Chinese owned Swedish EV maker Polestar admits targetting fed up Tesla owners with…

3 hours ago

OpenAI Countersues Elon Musk, Citing Interference

Escalation of feud between Sam Altman and Elon Musk, after OpenAI confirms it is now…

5 hours ago

AI To Drive Data Centre Energy Demand

Report from International Energy Agency (IEA) warns AI is set to drive surging electricity demand…

7 hours ago

PC Shipments Grow In Q1 Amid Tariff Worries

Shipments of personal computers grew in the first quarter, IDC and Canalys report, amid concern…

8 hours ago

Amazon Delays Project Kuiper Launch Amid Bad Weather

First launch of Amazon's Project Kuiper internet satellites pushed back amid “stubborn” cloud cover, heavy…

11 hours ago

Apple Airlifts 600 Tons Of iPhones From India, Amid Trump Tariff Chaos

As Trump eases his global tariffs, but ramps up China's input duty, Apple reportedly airlifts…

12 hours ago