Researcher sidesteps Microsoft fix for IE zero-day
Microsoft's short-term fix cannot cover all the different paths a criminal can take to exploit the bug, which the exploit highlights
CSO - A researcher has bypassed Microsoft's temporary fix for a zero-day Internet Explorer browser vulnerability that hackers have been exploiting for a month.
The exploit, developed by Peter Vreugdenhil of the vulnerability analysis company Exodus Intelligence, places pressure on Microsoft to release a permanent fix sooner rather than later. The software maker did not include a permanent patch in its advanced notification of seven security updates set for release next week.
Vreugdenhil was able to bypass Microsoft's "fix it" in a fully patched Windows XP system running IE 8, said Brandon Edwards, vice president of Intelligence at Exodus. Microsoft released the temporary fix last week for the bug that affects IE6, IE7 and IE8 browsers released between 2006 and 2009.
Hackers started exploiting the flaw on Dec. 7 by planting malware on the respective servers running the websites of the Council on Foreign Relations, a foreign policy think-tank, and Capstone Turbine, a U.S. manufacturer of gas-powered micro-turbines. People visiting the sites with the affected browsers were open to having their computers hijacked and personal data stolen.
Vreugdenhil, an IE expert, was able to find a way around Microsoft's fix in six hours. "It's a quick turnaround time to identify a flaw in a fix," Edwards said.
Microsoft's temporary fix is meant to block the way the flawed code is being exploited in the wild by crashing the browser before malware can be installed. However, the fix cannot cover all the different paths a criminal can take to exploit the bug.
"What we did was identify another path to reach the vulnerability and exploit it," Edwards said. A permanent patch would involve rewriting the code, so the vulnerability no longer exists.
[See related: 10 ways to secure browsing in the enterprise]
Microsoft confirmed that Exodus had contacted it about the findings. "We are aware of this claim and have reached out to the group for more information," said Dustin Childs, group manager for Microsoft Trustworthy Computing.
While agreeing that Exodus' work added pressure on Microsoft to release a permanent fix, security experts said the company's Enhanced Mitigation Experience Toolkit would prevent criminals from exploiting the vulnerability. EMET is a utility Microsoft provides at no charge. The mitigation technology acts as a wall hackers must climb in order to reach a flaw.
"Organizations wanting safety until the official patch is released should be using EMET, as it is far superior to the one-click 'fix it," said Chester Wisniewski, a senior security adviser for Sophos.
In related news, Symantec linked the latest vulnerability to a sophisticated hacker group that the vendor calls the Elderwood gang. An analysis of the attack code used in the compromised Web sites revealed similarities to other code used by the group.
Since 2009, the group has used as many as nine zero-day exploits distributed in malware sent through targeted emails, known as spear phishing, or planted in hacked sites.
Zero-day vulnerabilities are especially valuable to cybercriminals because they affect software vendors have not yet patched.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- Increase IT Performance from the Enterprise to the Cloud with WAN Optimization Massive consolidation and data mobility, enabled by virtualization, have radically altered how we build servers, design applications, and deploy storage for the emerging...
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Video Stream Quality Impacts Viewer Behavior This scientific white paper, using statistical data from Amakai's streaming network, analyzes how changes in video quality cause changes in viewer behavior.
- Service-Enabling CICS Applications: Best Practices This informative webcast provides an informed, thorough look into CICS service-enablement options and how they can affect your environment. You'll learn how to... All Applications White Papers | Webcasts