Skip the navigation

Microsoft turns to creative tactic to block IE attacks

Security experts applaud Windows Application Compatibility Toolkit 'shim'

January 11, 2011 03:25 PM ET

Computerworld - Microsoft today turned to a new defensive measure to help users ward off ongoing attacks exploiting a known bug in Internet Explorer (IE).

As expected, the company also patched three vulnerabilities in Windows.

"The 'shim' for IE is the news today," said Andrew Storms, director of security operations at nCircle Security. "We had not expected a patch for IE today, but we had not expected the shim either."

Shim is a term used to describe an application compatibility workaround. Storms said it was appropriate to today's temporary fix because Microsoft used the Windows Application Compatibility Toolkit to modify IE so it's immune to attacks that leverage a bug in how the browser processes a CSS (Cascading Style Sheets) file.

"This is the first time that they've used the Application Compatibility Toolkit to mitigate a zero-day vulnerability," said Storms.

The tool, which has been part of Windows since XP's days, was designed to allow older applications, including those created for outdated versions of the OS, to run on newer editions of the operating system.

Microsoft's workaround used the Application Compatibility Toolkit to modify the core library of IE -- a DLL, or Dynamic-Link library, named "Mshtml.dll," that contains the rendering engine -- in memory each time IE runs. The modification prevents recursive loading of a CSS, which effectively stops the existing attacks.

"Microsoft's using the App Comp in an unexpected way," said Storms. "They've incarnated it to help mitigate a zero-day. They're going to use whatever is in their arsenal, that's the bottom line."

Other researchers also applauded the new tactic.

"That was creative," said Wolfgang Kandek, chief technology officer of Qualys, a California-based security risk and compliance management provider. "We like it because it gets the fix out earlier than a true patch."

Qualys today confirmed that after applying the Application Compatibility-based workaround, the current in-the-wild exploit fails to execute.

"One nice thing about the shim is that it doesn't have to be uninstalled prior to installing the patch, whenever that appears," said Storms.

Kandek expects that Microsoft will shut the IE hole on Feb. 8 as part of its usual monthly Patch Tuesday. However, Storms saw the shim's release as a good hint that Microsoft will ship an emergency, or "out-of-band," update for the browser before then.

"I think they have [a patch], but they aren't happy with the QA it's received, so the door is open for an out-of-band if their attack telemetry shows an increase in exploits," Storms said.



Our Commenting Policies