New IE Zero-Day Being Exploited In the Wild 134
wiredmikey writes "A new zero-day vulnerability affecting Internet Explorer is being exploited in the wild affecting IE 9 and earlier. The vulnerability, if exploited, would allow full remote code execution and enable an attacker to take over an affected system. Security researcher Eric Romang discovered the vulnerability and exploit over the weekend while monitoring some infected servers said to be used by the alleged Nitro gang. To run the attack, a file named 'exploit.html' is the entry point of the attack ... According to analysis by VUPEN, the exploit takes advantage of a 'use-after-free vulnerability' that affects the mshtml.dll component of Internet Explorer. Rapid7 on Monday released an exploit module for Metaspolit which will let security teams and attackers alike test systems."
I/E 9 at risk (Score:5, Funny)
Re: (Score:1)
I'm shocked. Shocked I tell you.
Clearly we should stop supporting all browsers before IE12 and Firefox 39725.1
Re:I/E 9 at risk (Score:5, Funny)
Re: (Score:2)
Re: (Score:3)
We should take a page from the book of the mod_security team and add "exploit.html" to our list of URL filters. Make sure your AV software is also set to block "virus.exe" from running.
The mod_security reference is about the fact that they block files called "shell.php" from running, as if blocking specific filenames equals security. We had a hard time figuring out why the servers were refusing to acknowledge the existence of the PHP scripts that were launching our courseware shells.
Re: (Score:3)
Also, I think they should modify all future browsers to use extra caution when opening a file called "exploit.html" . In retrospect, it seems so obvious...
No need... a properly configured firewall will do it [ietf.org] before the browser gets the page
Re: (Score:1)
Re: (Score:3)
FF 10^100 = google chrome
Re: (Score:1)
FF 10^100 = google chrome
FF 10^100 == google chrome
Fixed...
Re: (Score:2)
FF 10^100 == Googol Chrome
Fixed..
Copyright lawsuits avoided...
Re: (Score:2)
sorry, must have been a typo...
Re: (Score:2)
Firefox 10^2
I think you meant Firefox 10^20
Re: (Score:2)
Clearly we should stop supporting all browsers before IE12 and Firefox 39725.1
Unless I'm mistaken, IE is the only browser to ever be vulnerable to a drive-by (please correct me if I'm wrong). I thought with W7 MS had pretty much gotten its act together in regards to security and software bugs, but I guess I was wrong about that.
Just say no to Microsoft. It isn't safe.
Re: (Score:3)
Completely wrong, as it happens, although I'm honestly not sure how you could have gotten that idea. Drive-by exploits, in the sense of "you visit a website and are pwned", have existed for all major browsers.
Firefox: much like this IE9 bug; only requires you to execute some script [secunia.com]
Chrome: buffer mismanagement in SPDY or bad casts in SVG [secunia.com]
Safari: visit a website and automatically execute a shell script from it [secunia.com]
Opera: buffer overflow using file download name in the prompt (can trigger automatically) [secunia.com]
To be fair,
Re: (Score:2)
I know you were going for funny but, well "I am shocked."
Microsoft has taken IE security pretty seriously and has established a pretty darn good track record with IE7->9 so far, at least on ASLR enabled platforms. I am surprised to see a reliable exploit that can be implemented as a drive-by on otherwise current platforms. This going to be a big deal and likely force an off cycle patch.
Re: (Score:1)
IE 9 has aslr, sandboxing, drp, plis a phishing list protection. You can hate on their html 5 support but only Chrome comes close.
IE 9 has holes and so does Chrome and Ff. Especially with flash!
Obviously (Score:2)
Re:I/E 9 at risk (Score:5, Insightful)
I'm shocked. Shocked I tell you.
Almost every major browser in use has had a vulnerability. Those that haven't are vulnerable because of commonly-used plugins. It's not just IE9, it's browsers in general... it's the repeated and systemic perversion and added complexity of trying to turn the web into the end-all and be-all of the internet. When it was created, the uses for it were not as complicated as they are now.
It's the complexity of the web that is its vulnerability -- I honestly don't think there's a way to write a truly-secure web browser because everything from the protocols up have been shoehorned into things they were never designed to do. The entire thing needs to be jettisoned -- html, css, xml, http, ssl, everything. We need to start over from scratch, and build a new set of protocols and specifications, not just continually band-aid over existing ones. And this time, security needs to be a design consideration from the start, not evolved in.
Anyone with an understanding of information systems' security will tell you -- security needs to be built in from the start or it doesn't matter how much effort you put in later, you're going to be chasing down problems forever. Start with a secure and vetted design and it's a lot more likely to perform. Of course, real security would mean that governments, corporations, and other interested parties wouldn't be able to snoop on what you're doing -- anything sent in the clear can be screwed with. Oh... and it wouldn't be as convenient as it is today; You'd have to think about what you were doing, instead of blithering about and when you get "hacked" blaming everyone but yourself.
Real security would mean no more excuses... from anyone. That's why you won't exactly be seeing a parade down main street anytime soon congratulating people on making computers more secure; Responsibility? Not on MY internet!
Re: (Score:1)
Well, you can mitigate the damage (Score:2)
Running web browsers in a well-written sandbox with only very careful access to "the outside machine" will help keep browser bugs from turning into system-wide vulnerabilities.
Sure, someone may take over your browser and turn it into DNS-generation-engine, but once you quit your browser, anything left over will require a social-engineering attack ("download catpics.exe and after you quit your browser, run it!") to continue living.
While no sandbox is perfect [informationweek.com], there is (hopefully) a smaller and better-enginee
Re: (Score:3)
Managed / memory-safe languages aren't a guaranteed protection, though.
First of all, there can be bugs in the runtime that lead to possible exploits. I have a friend who manages to generate segfaults in Java about once every two weeks (no idea how many of them are the same bug being hit multiple times; maybe all of them). In case you're confused, a segfault (as opposed to a NullPointerException) means the runtime thought it could access the memory there, after running all its checks... and found out otherwi
Re: (Score:3)
Re: (Score:3)
but every. single. time. I've had a user tell me they have "A problem with Internet explorer" I open the thing up and its got more toolbars and other malware bullshit than you can even count, anybody stupid enough to use IE while the spyware and toolbars and other shit just keeps piling up deserves what they get.
Heh, a friend told me the other day he broke his monitor with his mouse; his XP PC had slowed to a crawl after he let his daughter in law use it. I looked at it for him, it was full of useless crud
Re: (Score:2)
Re: (Score:2)
and probably Vupen already sold it 10 months ago to , Ebay style.
Yes and no (Score:1)
If there are no practical, well-understood or at least vendor-supported work-arounds, then for the vast majority of people, it's still a "zero-day."
Hopefully MS and the other affected vendors (e.g. Adobe) will announce a practical work-around within a day or two.
I should be safe! (Score:2)
... as long as it doesn't strike in those first few minutes where I have a freshly installed system and am using IE to download FIrefox (IE is great for this, by the way!) ... then I should be safe!
You should be safe (Score:1)
I think this actually requires you to visit a poisoned web site.
So, unless the web site or torrent that you are getting Firefox from is compromised, you should be okay.
Re: (Score:3)
Not really.
Compromised ad servers seem to happen often enough still. People have in not so recent past gotten infected from not so dangerous sites such as CNN.com.
Some sites are such morasses of server calls to other places all jumbled in one page it defies description. True, someone visiting the same four sites is going to be OK, but someone visiting Facebook (as an example) may very well be exposed.
Re: (Score:2)
Day Zero (Score:4, Funny)
Let's blame Unix! (Score:2)
After all, you're right - there sure seem to be a lot of Day 0 vulnerabilities. If programming languages just started counting from 1 like sensible people do, this could all be avoided.
Re: (Score:2)
Re: (Score:2)
How many IE9 users got infected? (Score:1)
Both.
Getting fed up (Score:5, Interesting)
Re: (Score:2)
Re: (Score:3)
It's only a matter of tim.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
All programs should be run as their own users
Network admins would love creating 30 user accounts for every person and every person would love remembering 30 accounts.
Re: (Score:2)
Why the hell would you do it that way? All major OSes, including NT (XP, Vista, Windows *, Windows Server *), have the ability to *automatically* run a program as a specific user, even if that user is different from the user that launched the program. On POSIX systems, this is enshrined in the filesystem permission bits; setUID and setGID.
Win8 actually does this for apps installed from the Marketplace. Each one gets a new, unique SID (security identifier, essentially a user account except without things lik
All of Windows could be sandboxed (Score:2)
Re: (Score:1)
Re: (Score:1)
Actually there have been 30+ exploits in Firefox between 3.6 and the current release over the year and a half!
They are everywhere and nupen came to fame earlier this year from cracking Chrome. It is not a design flaw per say as IE 9 is sanboxed. It is hard when you have JIT javascript, flash, and java which job is to ACTUALLLY EXECUTE on the given platform.
According to the exploit it needs flash or java to spray the sandbox heap until the sandbox eventually gets compromised. So that is the problem right the
Re: (Score:2)
AFAIK the original exploit targets XP where it is NOT sandboxed.
Re: (Score:1)
IE 7 and above are sandboxed!
MS sucks in many areas in their browsers but recently they have redeamed themselves in this area. Firefox is a joke in comparison and was so bad adobe had to make a custom version of flash taht was sandboxed. Chrome already had both sandboxed
stealthy file name (Score:1)
Question: (Score:2)
Yes I RTFAed. It doesn't really spell out what combo of IE and Windows are vulnerable.
Re:Question: (Score:5, Informative)
Re: (Score:3)
do you think the "and earlier" versions that are also vulnerable might be on XP?
Re: (Score:2)
Re: (Score:2)
The exploit is for IE 9 and earlier. XP can use iE 6 through IE 8 - all of which are earlier than IE 9.
Re: (Score:2)
Re: (Score:2)
IE9 only runs on Vista, 7 and Server 2008. So XP isn't affected assuming IE8 also isn't. (Since they didn't mention IE8, I assume you're safe?)
Re: (Score:2)
Oop, the SecurityWeek article specially mentions that IE7 and IE8 on XP *are* affected and exploits them were spotting in the wild.
This means:
IE7, IE8 on XP = definitely vulnerable
IE7, IE8, IE9 on Vista/7 = probably vulnerable but no exploit seen in the wild
Re: (Score:2)
"""
The underlying flaw affects IE 9 and earlier, and from what has been seen so far, the in-the-wild exploit only targets IE 8 and 7 on Windows XP only, Bekrar said.
"""
TFS mentions the "earlier" versions too.
Re: (Score:2)
The underlying flaw affects IE 9 and earlier, and from what has been seen so far, the in-the-wild exploit only targets IE 8 and 7 on Windows XP only, Bekrar said.
Re: (Score:1)
Re: (Score:2)
exploit yes, virus no (Score:5, Informative)
From TFA:
First, a file named “exploit.html” appears to be the entry point of the attack, which loads “Moh2010.swf”, an encrypted Flash file that it decompress in memory.
According to AlienVault's Jaime Blasco, the payload dropped is Poison Ivy, as was the case with the previous Java zero-day. Poison Ivy is a remote administration tool (RAT) that was used the Nitro attacks that targeted chemical and defense companies. Interestingly, after exploitation, the attack loads “Protect.html”, a file that checks to see if the Web site is listed in the Flash Storage settings, and if it is, the Web browser will no longer be exploited despite additional visits to the malicious site.
"the zero-day season is really not over yet" (Score:1)
Some say a diamond is forever.
I'd say the same about "the zero-day season" at least with respect to systems like Windows as we know it + commonly used 3rd party applications as we know them.
new zero-day? (Score:2)
Re: (Score:2)
No - redundant.
Re: (Score:2)
The term has since changed, and now a 0-day seems to be any unpatched vulnerability, no matter how long the public/manufacturer have been aware of it.
Under the old definition (which actually makes sense) news about a 0-day is impossible, since once it's in the news it's not a 0-day anymore. Th
Does this include IE9-64? (Score:3)
Yes I RTFA and didn't see any information on whether IE9-64 is affected. Pretty lousy of the tester to not bother indicating if the problem is only with the 32bit version as the 64bit has a better baseline security configuration. Due to these issues, it's just one of the reasons I also use Palemoon64. Improved security such as full ASLR along with DEP support so I'm hopefull this does not affect IE9-64 due to the limited number of folks actually using it.
Re:Does this include IE9-64? (Score:5, Informative)
Yes, IE9-64 is affected by the vulnerability. Whether exploits in the wild will succeed against it is another question...
Re: (Score:2)
I thought PCs didn't get viruses? Oh wait, that was Macs.
PC stands for "Personal Computer" and macs are PCs. Some PCs get viruses... the ones running Windows. Any computer can be trojaned or taken over by other social engineering, but Windows is the only OS prone to drive-by infections.
Safety precautions (Score:2)
Internet Explorer is still a thing? (Score:5, Funny)
Isn't IE that tool people use to download Firefox?
Re: (Score:2)
Isn't IE that tool people use to download Firefox?
(0) kiak /home/keeling_ aptitude search explore /home/keeling_ which firefox
/usr/bin/firefox
p bzr-explorer - GUI application for using Bazaar
p emboss-explorer - web-based GUI to EMBOSS
p kzenexplorer - manage tracks and playlists on Creative La
p swac-explore - audio collections of words (SWAC) explorer
p tracker-explorer - metadata database, indexer and search tool
(0) kiak
Nope. "Oh. My. Gawd! Another IE zero day exploit!" Well, if you weren't using the !@#$ it wa
Re: (Score:2)
[root@server ~]# aptitude search explore /usr/bin/which: no firefox in (/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/root/bin)
-bash: aptitude: command not found
[root@server ~]# which firefox
Nope.
Re: (Score:2)
apt-get install aptitude && aptitude update && apt-get install iceweasel && HTH. # Enjoy. :-)
FF was installed with the OS when I reinstalled recently. Tooduls.
Re: (Score:2)
yum install firefox?
pacman -S firefox?
Re: (Score:2)
yum would work ;)
Except that as a headless web server, it doesn't run X so Firefox is right out.
yum install links it is!
so this affects what... about 5 users? (Score:1)
Re: (Score:2)
does anyone actually use IE when they don't have to?
I've known people who thought IE was the Internet. No amount of $BASEBALLBAT could sway them from that belief. There's people on /. who think they'll never have to give up on XP.
Hence, Win* malware. It's some weird, deficient intellect related, form of masochism is all I can think. Whatever floats your boat, I guess.
Re: (Score:2)
There are also actually some useful features of IE that no other browser has be default (there are halfway-there implementations of some in Firefox extensions, and full implementations of a few others). I use IE, Firefox, and Chrome on a daily basis (Opera and Safari are also installed but rarely get used). For example, I prefer the built-in tab management in IE over both of the others, although I'm a little annoyed that they disabled Quick Tabs by default in IE9 (easy to restore it though). This is one are
Re: (Score:2)
There are also actually some useful features of IE that no other browser has [by] default ...
Yeah, like ready and willing access to an underlying OS which can't be bothered to protect itself from malware. Are you a malware author/distributor? I'll bet they love IE.
The lower classes have a couple of words they use that describes IE's behaviour wrt women. They start with a 'w' or an 's'.
Actually, I've no real problem with IE; it's a web browser. I blame its underlying OS's fragility.
Question though: (Score:2)
Does this exploit work if you're running a modern Internet security suite such as the new Norton Internet Security 2013 with all anti-malware definitions up to date? Mind you, my default web browser on my desktop and laptop is Google Chrome 21.0.1180.89, the current "stable" release version.
Re: (Score:1)
Re: (Score:2)
I'd almost agree, but most companies that sell Internet security software update their definitions many times a day around the clock. In fact, in Norton Internet Security 2013 on my desktop and laptop computers, the updates occur at least 7-8 times per days for the latest anti-malware definitions.
Re: (Score:1)
FWIW, I don't even see an official product page for the "2013" version, which makes me think you might be running a trojan and the 2012 version only updates every few days [symantec.com], which is typical.
Re: (Score:2)
I'm running the 2013 version, given it was directly downloaded from Symantec's own web site. :-) The release version (which came out a week ago) is 20.1.1.2. In fact, I found out that NIS 2013 can do "pulse" updates of anti-malware definitions about 2-3 rimes per hour.
DNH: 1 (Score:3)
UAC is pointless (Score:2)
The Slashdot Mental Disconnect (Score:1)
I wonder, given many people here are convinced it's a dying product, why a story like this makes the front-page? Either IE is popular so news like this is important, or IE is a side-lined product that has no relevance...it seems that narrative changes depending on if the news is good or bad.
I find it curious we rarely hear about new major product releases from MS, but the second there's a vulnerability it's the top story. Are we interested in IT or just IT that isn't MSFT tech? There's a difference.
Meh, wha
Alternative workaround (Score:1)