Posts

Internet Explorer Vulnerability Could Allow Remote Code Execution

Microsoft has released Security Advisory 2887505 regarding a remote code execution vulnerability (CVE-2013-3893) impacting Internet Explorer versions 6 through 11. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9. The Microsoft Fix it solution, “CVE-2013-3893 MSHTML Shim Workaround,” prevents exploitation of this issue.

You can mitigate this by using a browser other than Internet Explorer, or apply the following “Fix it”: http://support.microsoft.com/kb/2887505

More information can be found here: http://technet.microsoft.com/en-us/security/advisory/2887505

Have a great day,

Highly Critical Internet Explorer 8.0 vulnerability

A so-called “watering hole” hacking attack on the US Department of Labor website last week has spread to nine more global websites over the weekend, including those used by European aerospace and nuclear researchers.
Originally discovered on May 1, the Department of Labor’s Site Exposure Matrices site began, via JavaScript inserted into an iFrame format video, redirecting users to an infected site hosting the Poison Ivy remote access Trojan.

Users are recommended to upgrade their Internet Explorer to the latest version (10) from http://windows.microsoft.com/en-us/internet-explorer/download-ie , but those who can’t do that should at a minimum download the fix which has been provided by Microsoft: http://support.microsoft.com/kb/2847140

More information:
http://www.welivesecurity.com/2013/05/07/watering-hole-attack-on-dept-of-labor-site-exploited-new-ie8-vulnerability/
http://www.computing.co.uk/ctg/news/2266514/ie-8-zeroday-attack-spreads-to-military-sites

Zero-day Microsoft Internet Explorer

A new high risk zero Internet Explorer day exploit is currently being active in the wild.

That means that anyone using Internet Explorer 7,8 or 9 to browse the internet has the potential of getting infected by simply visiting a webpage with the specific bad code in it. The code will then download an exploit pack to your computer and can give the unauthorized people access into the infrastructure.

There is currently no patch or solution to the issue from Microsoft, so the only viable option is to switch to another browser. Thinking “I won’t click any links from unknown people” is unfortunately not enough, as it’s getting more and more common for these kind of people to either hack known sites and add the code, or to purchase banner space etc for well known sites which then launches the code without you noticing anything at all.

Two browsers you could use are:
Firefox: http://www.getfirefoxcom
Chrome: http://www.google.com/chrome/

For more information: http://www.kb.cert.org/vuls/id/480095

Update: Since, Microsoft has released an update. Run Windows Update to get the latest versions available.