Categories: SecurityWorkspace

Microsoft Pressured To Patch Zero Day As VUPEN Creates Serious Exploit

Microsoft is facing pressure to patch a zero-day threat that is being exploited in the wild, as vulnerability seller VUPEN has found a way to make the exploit work across all Windows platforms.

Attack code for the CVE-2012-1889 flaw, which affects Microsoft XML component found in Internet Explorer, was published earlier this month. The vulnerability could allow remote code execution if a user visits a specially-crafted webpage on Internet Explorer.

Security researchers have seen attempts to spread malware via an injection of malicious iframes on websites.

Sophos found a website of a European aeronautical parts supplier had been hacked and was serving up a malicious attack exploiting CVE-2012-1889. The drive-by attack vector was similar to another it had seen affecting a European medical company earlier this week, which was also taking advantage of the zero-day security hole.

Google has also been warning the flaw was linked to state-sponsored attacks.

VUPEN’s vicious vector

Today, VUPEN revealed it had downloaded the exploit code and made it into something much more serious. It said the in-the-wild exploits it had seen could only harm those running Windows XP, but its attack method could hit Windows 7 users too.

VUPEN’s chief executive Chaouki Bekrar told TechWeekEurope it could bypass additional security such as Protected Mode and address space layout randomization (ASLR), a technology that strengthens system security by increasing the diversity of attack targets. ASLR is a prophylactic measure rather than a cure, which randomises the memory layout of an executing program, decreasing the probability an exploit attempt will work.

“To demonstrate the criticality of the flaw, and raise the alarm over it to force Microsoft to release a patch we downloaded the in-the-wild exploit and we worked in our lab to transform it into a sophisticated code that works on all Windows including Windows 7,” Bekrar said.

“We hope that Microsoft will release an out-of-band patch as we know now that the flaw is more critical than thought…. they should react before the situation becomes worse.”

Bekrar admitted it was hard to transform the attack code as VUPEN researchers had to a find a new technique. This could indicate only well-funded and highly technical hackers could create something similar to VUPEN for malicious purposes.

VUPEN is planning to show how it transformed the exploit once Microsoft has introduced a patch.

There is currently no patch for CVE-2012-1889, but Microsoft has offered various workarounds, as well as a “Fix it” solution which Google advised users to initiate. IT teams can find Microsoft’s guidance on those fixes here.

At the time of publication, Microsoft had not responded to a request for comment on the situation.

Are you a security pro? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Signal App In Spotlight Amid Secret Chat Controversy Of US Officials

Messaging app Signal in the headlines after a journalist was invited to a top secret…

13 mins ago

OpenAI’s Lightcap To Take On Expanded Role

OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…

1 day ago

China Unveils Deep-Sea Cable-Cutting Device

Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…

1 day ago

Pat Gelsinger Joins Faith-Based Tech Company Gloo

Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…

1 day ago

MEPs Ramp Pressure For Second EU Chips Act

MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…

1 day ago

Xiaomi Raises $5.5bn In Expanded Share Sale

Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…

1 day ago