IE exploit covers all recent versions, hits most businesses

internet explorer logo

Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

A zero day flaw in Internet Explorer (IE) that impacts all versions of the browser is being actively exploited in the wild, Microsoft reports.

Exploits seem to have focused on IE versions 8 and 9, according to Microsoft. But researchers at Websense have discovered that nearly 70 percent of Windows business users are susceptible to this IE zero-day exploit.

"We reviewed third-party telemetry feeds from real-time global internet requests to determine the initial scope. While the exploit appears to affect all versions of IE, at the moment attacks only seem to be targeting users of IE8 and IE9 who are running Windows 7 and XP operating systems," Websense's director of security research, Alex Watson, said in a statement.

According to the advisory, Microsoft said that IE installations running on Server 2003, 2008, and 2012 will mitigate the vulnerability due to its installation parameters. Experts have suggested that the scope of the problem is bad enough that Microsoft will likely release a fix outside of its usual patch schedule.

Unless Microsoft issues an out-of-band patch, the next round of security patches from Redmond are due October 8.

"This recently discovered Internet Explorer zero day vulnerability is bad. Users and administrators should take immediate action to mitigate the risk. Considering the timing, I personally expect to see an out of band patch from Microsoft," Rapid7's senior manager of security engineering, Ross Barrett, told CSO.

"All versions of IE are affected, which means that this vulnerability has likely been present since IE 6 was released in 2001. The fact that it is getting attention now is due to either a noticeable volume [of attacks] or impact of active exploitation in the wild. It may have just been discovered last week, or it may have been in the private toolkit of the world's best malware writers for more than a decade. This is as severe as any browser issue can be."

Exploits expected soon

Patrick Thomas, security consultant at Neohapsis, said in a statement to CSO that he expects to see this vulnerability added to exploit kits and see a wide general use by criminals within weeks.

Exploit kit writers actively reverse-engineer Microsoft patches," he added. "So while this exploit was initially constrained to a small group of targets, it will likely be included in various commercial exploit kits and in wide, general use within the next one to five weeks."

The discovery of this latest Internet Explorer flaw is further proof that attackers continue to target low-hanging fruit, Thomas explained. The use of Address Space Layout Randomization (ASLR) is one of several defensive technologies baked into modern programs and libraries. Such protective measures make attacks like the ones observed targeting Internet Explorer significantly harder.

"Its no coincidence that attackers are targeting a dynamic-link library (DLL) that did not get compiled with ASLR. Enterprise administrators should be aware of what software on their networks uses and does not use modern, built-in protections, including DEP, ASLR, and stack protections, and consider upgrade plans or increased patching priorities to mitigate risks from these more easily-targeted programs," Thomas said.

Microsoft is encouraging IT administrators to install the FixIt patch ( CVE-2013-3893 MSHTML Shim Workaround) to mitigate potential damage, until a proper fix is issued. The FixIt only applied to 32-bit installations, so other mitigations such as EMET 3.0 and 4.0 are also encouraged.

This story, "IE exploit covers all recent versions, hits most businesses" was originally published by CSO.

Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details.
Shop Tech Products at Amazon