Do you use Internet Explorer? If you do, hopefully you’ve already applied the updates from Patch Tuesday earlier this week. But, even if you did it seems your browser might still be vulnerable to a potentially serious issue.
Spider.io disclosed the vulnerability to Microsoft on October 1, 2012, but it was not addressed in the most recent security update for Internet Explorer. Spider.io asserts that the flaw is being actively exploited, and claims the Microsoft Security Research Center (MSRC) has acknowledged the vulnerability, but has no immediate plan to patch it.
I asked Microsoft for its position on the alleged vulnerability. A spokesperson sent me this official response: “We are currently investigating this issue, but to date there are no reports of active exploits or customers that have been adversely affected. We will provide additional information as it becomes available and will take the appropriate action to protect our customers.”
Jason Miller, manager of research and development for VMware questions whether the issue is a “bug” or a “feature”. “One could question whether this is a vulnerability or a feature introduced into the browser to help establish metrics of usage. Regardless, the researchers have proven that this “issue” could be used maliciously.”
I spoke with Qualys CTO Wolfgang Kandek. He expressed concerns over the implications such a vulnerability might have for online banking. Many banks have implemented on-screen virtual keyboards for entering account credentials as a means of avoiding traditional keylogger attacks.
Andrew Storms, director of security operations for nCircle, agrees. “This exploit renders that mitigation null and void — it has the effect of a key logger on virtual keyboards. Attackers could potentially capture the clicks connected with banking credentials using this exploit and that isn’t good news for the 63 million Americans that bank online.”
Alex Horan, senior product manager at CORE Security, adds that supposedly “safe” websites may not be so safe. “It also reinforces that just because you are visiting YouTube or the New York Times doesn’t mean all the content on that site is owned or managed by them—serving up malicious ads on trusted mainstream sites is a great way to expose your attack to a large volume of user.”
Horan suggests abandoning IE until or unless the issue is patched by Microsoft.
Storms says, “If this vulnerability is confirmed, it has the potential to require an out-of-band patch and that’s something everyone would like to avoid this holiday season.”
Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.