Microsoft releases fix-it for Internet Explorer 8 vulnerability
The vulnerability was used by attackers last week against the U.S. Department of Labor
IDG News Service - Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
The problem is particularly dangerous since it can allow an attacker to install malware merely by visiting a tampered web page. Microsoft is still working on a patch, wrote Dustin Childs, group manager for the company's Trustworthy Computing division.
"Customers should apply the Fix it or follow the workarounds listed in the advisory to help protect against the known attacks," Childs said in a statement.
The vulnerability is described as a problem in the way IE "accesses an object in memory that has been deleted or has not been properly allocated." IE versions 6, 7, 9 and 10 are not affected.
Microsoft calls the fix "CVE-2013-1347 MSHTML Shim Workaround." The company normally issues updates for its products on the second Tuesday of the month, but will issue an out-of-schedule patch if the problem is deemed serious enough.
Security vendors Invincea and AlienVault found that hackers planted attack code within a U.S. Labor Department web page with information on toxic substances at U.S. Department of Energy facilities.
The code redirected people to another infected page within the site, which then attempted to exploit the IE 8 vulnerability. AlienVault said the hacking campaign appeared similar to a known China-based one called "DeepPanda," which installed remote-access trojans (RATs).
A large Fortune 500 company was attacked in December 2011 by DeepPanda, AlienVault said.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts