IE zero-day exploit code goes public
Expect attacks against unpatched browsers to gain momentum, say researchers
Computerworld - Exploit code for the unpatched bug in Internet Explorer was published on the Web yesterday, a step security pros said earlier would be the precursor to widespread attacks.
Israeli researcher Moshe Ben Abu used a clue in a Wednesday blog post by security vendor McAfee Inc. to grab an in-the-wild exploit, strip it of its obfuscations and use it to craft a working attack module for the popular Metasploit open-source penetration framework.
"It was quite easy," said Abu in an e-mail reply to questions late yesterday, referring to the time it took him to build the Metasploit module from the exploit code he'd found. "[It took] no more than a few minutes."
Abu's exploit was added to the Metasploit tree earlier Wednesday after review by the Metasploit development team, confirmed HD Moore, the creator of the Metasploit framework and chief security officer at security company Rapid7 LLC, which manages the open-source Metasploit project. Abu has contributed 10 exploit modules to Metasploit in the past three years, added Moore.
Microsoft Corp. first warned users of the vulnerability in Internet Explorer 6 and IE7 on Tuesday, when it issued a security advisory, typically a first step in the path toward delivering a patch when exploits or attacks are public.
By Wednesday, antivirus companies were reporting that hackers were using the exploit to launch drive-by attacks from malicious sites, including the one hosting the code that Abu found.
Abu claimed that the exploit worked on fully-patched PCs running Windows Vista Service Pack 2 (SP2) and IE7, as well as machines running Windows XP SP3 and IE6 or IE7. But the attack code isn't foolproof: It works between 60% and 75% of the time, said Abu.
Moore said the exploit's success rate is in the lower end of Abu's range. "The exploit is somewhat unreliable, as it shares traits with other use-after-free flaws, such as the bug exploited in the 'Aurora' attacks," said Moore, talking about the IE6 exploit used to hack into Google Inc.'s corporate network. "Based on our testing, we are seeing the exploit work best against Windows XP SP3 IE7 with rates close to 60%, without DEP [data execution prevention]. Other platforms are less reliable right now, but it's likely just a case of tuning the parameters for each target."
Security experts consider public posting of exploit code, especially when it's added to the popular Metasploit, as a milestone that usually means attacks will grow in number as other hackers use the code.
They also have said it's a signal that Microsoft might rush out an emergency fix. "Generally, one of the indicators is if an exploit has gone public," said Andrew Storms, director of security operations at nCircle Network Security Inc., in an interview Tuesday. "That often determines how quickly they'll patch."
Microsoft hasn't committed to a patching schedule for the IE bug, but the company said on Tuesday that one option would be to deliver an "out-of-band" update before its next Patch Tuesday, April 13.
Until a patch is available, Microsoft has recommended that users modify access to the "iepeers.dll," disable scripting and enable DEP. Users can also upgrade Internet Explorer to IE8, which does not contain the bug.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts