Microsoft turns to creative tactic to block IE attacks
Security experts applaud Windows Application Compatibility Toolkit 'shim'
Computerworld - Microsoft today turned to a new defensive measure to help users ward off ongoing attacks exploiting a known bug in Internet Explorer (IE).
As expected, the company also patched three vulnerabilities in Windows.
"The 'shim' for IE is the news today," said Andrew Storms, director of security operations at nCircle Security. "We had not expected a patch for IE today, but we had not expected the shim either."
Shim is a term used to describe an application compatibility workaround. Storms said it was appropriate to today's temporary fix because Microsoft used the Windows Application Compatibility Toolkit to modify IE so it's immune to attacks that leverage a bug in how the browser processes a CSS (Cascading Style Sheets) file.
"This is the first time that they've used the Application Compatibility Toolkit to mitigate a zero-day vulnerability," said Storms.
The tool, which has been part of Windows since XP's days, was designed to allow older applications, including those created for outdated versions of the OS, to run on newer editions of the operating system.
Microsoft's workaround used the Application Compatibility Toolkit to modify the core library of IE -- a DLL, or Dynamic-Link library, named "Mshtml.dll," that contains the rendering engine -- in memory each time IE runs. The modification prevents recursive loading of a CSS, which effectively stops the existing attacks.
"Microsoft's using the App Comp in an unexpected way," said Storms. "They've incarnated it to help mitigate a zero-day. They're going to use whatever is in their arsenal, that's the bottom line."
Other researchers also applauded the new tactic.
"That was creative," said Wolfgang Kandek, chief technology officer of Qualys, a California-based security risk and compliance management provider. "We like it because it gets the fix out earlier than a true patch."
Qualys today confirmed that after applying the Application Compatibility-based workaround, the current in-the-wild exploit fails to execute.
"One nice thing about the shim is that it doesn't have to be uninstalled prior to installing the patch, whenever that appears," said Storms.
Kandek expects that Microsoft will shut the IE hole on Feb. 8 as part of its usual monthly Patch Tuesday. However, Storms saw the shim's release as a good hint that Microsoft will ship an emergency, or "out-of-band," update for the browser before then.
"I think they have [a patch], but they aren't happy with the QA it's received, so the door is open for an out-of-band if their attack telemetry shows an increase in exploits," Storms said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts