Feeds

Exploit code for potent IE zero-day bug goes wild

'Fairly reliable'

SANS - Survey on application security programs

Updated Exploit code targeting the Internet Explorer vulnerability used against Google and other companies has gone public, increasing the chances that broader attacks will soon follow.

Both the open-source Metasploit framework and the commercial Immunity Canvas software for penetration testers have working exploits that fully compromise computers running earlier versions of the browser. The attacks target a previously unknown invalid pointer reference bug in IE that attackers used to penetrate the defenses of Google and dozens of other companies.

The exploits come as the German Federal Office for Information Security said IE users should switch to an alternative browser until a patch for IE has been made available.

The exploit in Canvas was "fairly reliable" at remotely executing code in tests of IE versions 6 and 7 running on Windows XP SP3, Immunity researcher Kostya Kortchinsky wrote in an email. "It crashed IE 8 and will require a bit more work to get something out of it," he added.

The exploit folded into Metasploit was tested on IE 6 running on the same Windows platform, the framework's chief maintainer, H D Moore, wrote in a blog post.

While the flaw affects all versions of IE except for 5.01 SP 4, security protections built in to more recent versions of the browser and operating system can significantly mitigate the threat. DEP, short for data execution prevention, is enabled by default in IE 8 but must be manually turned on in prior versions. Users of Vista and later versions of Windows should run IE in protected mode, an additional feature that also provides important protection.

We've said it before, and given the particulars of this vulnerability, we'll say it again: security measures like DEP and ASLR, or address space layout randomization, matter. As ugly as this vulnerability is - to say nothing of its ability to remain undetected for nine years - the fact that Windows 7 and IE 8 were able to withstand the "highly sophisticated" attacks that felled Google is testament that Microsoft is making significant progress.

Shortly after this article was first published, Microsoft issued a statement that largely repeated the same mitigation details. But it also said researchers continue to see only "limited targeted attacks affecting Internet Explorer 6." It went on to "encourage" users of IE 6 and 7 to upgrade to the latest version "to benefit from the improved security features and defense in depth protections offered such as data execution prevention and smartscreen."

The advice is sound. If it's at all possible, upgrade to IE 8 now. The computer you save may be your own.

Microsoft hasn't said when it expects to fix the bug. Its next regular update release is scheduled for February 9. Speculation is growing that the company will issue an out-of-band patch.

Moore said the Metasploit maintainers got their hands on the exploit after it was uploaded to Wepawet. Kortchinsky said Immunity researchers believe their exploit is the same one but can't be sure. Anti-virus provider McAfee, which first discovered the exploitation of the zero-day flaw, said here that the public exploits use the same code it has observed.

So far, exploitation of the IE bug has been seen only in highly targeted attacks that hit Google and at least some of the other 33 large companies that experienced similar assaults. With the public release of exploit code, the likelihood of much broader scams targeting the vulnerability are much greater. ®

This article was updated to add reporting and commentary.

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.