Skip the navigation

Researcher says IE bug could spread quickly

By Gregg Keizer
July 13, 2009 12:01 AM ET

Computerworld - A critical ActiveX vulnerability used by hackers to exploit Microsoft Corp.'s Internet Explorer browser is a prime candidate for another Conficker-scale attack, security experts said.

On July 6, just hours after security companies reported that thousands of compromised sites were serving up exploits, Microsoft acknowledged the flaw in the ActiveX control that can be accessed using IE. The bug has been used by hackers since at least June 9.

Microsoft said it will issue a patch for the flaw on July 14.

The vulnerability "exposes the whole world and can be exploited through the firewall," said Roger Thompson, chief research officer at security software vendor AVG Technologies USA Inc. "That's better than Conficker, which mostly did its damage once it got inside a network."

Conficker exploited a Windows flaw that Microsoft had thought dire enough to fix outside its usual update schedule in October 2008. The worm exploded into prominence in January, when a variant infected millions of machines that remained unpatched.

Microsoft confirmed the latest flaw shortly after security researchers at Danish firms CSIS Security Group AS and Secunia said that thousands of hacks of legitimate Web sites over the July 4 weekend had exploited the bug.

The hackers took advantage of the bug to reroute users to a malicious site, which in turn downloads and launches a multiexploit hacker tool kit.

Two days after disclosing the bug, Microsoft admitted that members of IBM's X-Force threat research team had first reported the vulnerability to it sometime in 2008.

The X-Force researchers had uncovered the flaw in late 2007, and in December of that year reserved a number in the Common Vulnerabilities and Exposures list of publicly known information security vulnerabilities.

One of the researchers, Alex Wheeler, now manager of 3Com Corp.'s TippingPoint DVLabs, declined to say exactly when the flaw was discovered, citing a nondisclosure agreement he had signed with his former employer.

A Microsoft spokesman didn't say why the flaw wasn't patched earlier.

"When we were alerted in 2008, we immediately started an investigation," the spokesman said in an e-mail to Computerworld. "As we wanted to be thorough, this took extra time to fully evaluate."

This version of the story originally appeared in Computerworld's print edition.

Read more about Security in Computerworld's Security Topic Center.



Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!