Exploit now publicly available for unpatched IE flaw
'Its just a matter of time before (it) gets turned into a virus or a worm,' says one security expert
Computerworld - An exploit has become publicly available for a newly disclosed critical -- and as yet unpatched -- vulnerability in Microsoft Corp.s Internet Explorer Web browser (see "IE worries continue with critical bug").
The exploit, which has been posted on several Internet sites, gives even relatively novice hackers an easy way to take advantage of a flaw in the way IE processes information using the createTextRange () method, according to Secure Elements Inc., a Herndon, Va.-based security firm.
Its just a matter of time before the exploit gets turned into a virus or a worm capable of creating considerable damage on unprotected systems, said Scott Carpenter, director of security labs at Secure Elements.
"The most probable vector for this worm will be in the form of an e-mail with malicious links that will tempt users into clicking on a link that takes them to a Web site from which malicious code can be downloaded, he said.
According to Carpenter, the exploit code was originally released by a hacker group known as Unl0ck.net and has since been published on various sites.
The public availability of that exploit code prompted the SANS Internet Storm Center to raise its alert level to Yellow from the normal Green for the next 24 hours.
The flaw in question was disclosed earlier this week and relates to the manner in which IE responds when presented with specially crafted HTML code. The flaw allows hackers to present data that would corrupt system memory in a way that could allow the attacker to execute arbitrary code, according to a Microsoft description of the flaw.
The vulnerability exists on fully patched systems with IE 6.0 running Microsoft Windows XP service Pack 2. The vulnerability has also been confirmed in the IE 7 Beta 2 Preview (January edition).
This vulnerability could allow an attacker to execute arbitrary code on the user's system in the security context of the logged-on user, Microsoft said.
As a result, systems that are configured to give users limited access rights will be less affected, while those that have full administrative privileges could find their systems completely under the control of a remote attacker, Carpenter said.
Despite the potentially critical nature of the vulnerability, there are several mitigating factors, according to Microsoft. An attacker would have to first convince users to visit a malicious Web site for the vulnerability to be exploited, and the flaw can't be exploited automatically through e-mail or while viewing e-mail through the preview pane. Microsoft has also suggested turning off the Active Scripting function in IE as a way to prevent the exploit from working.
A Microsoft spokesman said that the company has seen a sample of proof-of-concept code but was not aware of any actually attacks or customers being affected.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts