New IE Remote Code Execution Vulnerability Discovered 63
An anonymous reader writes "Microsoft is investigating a new remote code execution vulnerability in Internet Explorer and preparing a security update for all supported versions of its browser (IE6, IE7, IE8, IE9, IE10, and IE11). The company has issued a security advisory in the meantime because it has confirmed reports that the issue is being exploited in a 'limited number of targeted attacks' specifically directed at IE8 and IE9."
Re: (Score:2, Insightful)
Common now, someone will have to repair the machines of those who don't use a real browser.
Re:News for nerds? (Score:4, Funny)
Re: (Score:3)
The number of letters required to spell its name of course. IE wins, hands down!
Re:News for nerds? (Score:5, Insightful)
Re: (Score:2)
Sense of humour fail?
Re: (Score:2)
A commonly used program has a long running vulnerability. I would definitely say that's right up /.'s alley.
Sense of humour fail?
I thought he was making his own joke :)
Re: (Score:2)
When is /. going to remove the anonymous coward option? People should own up to their comments. Pussies I tell you.
Re: (Score:2)
That's a fantastic opinion there "Ravaldy"... if that is your real name.
Re: (Score:2)
Just saying that these have 0 ID. At least we have accounts with history...
Re: (Score:3)
I see what you did there, but some IT guys / nerds work for companies that have managers that force IE down their departments' throats. Then when something goes wrong they blame it on the IT folks. News like this just gives us some plausible deniability for such cases.
Re: (Score:1)
Re: (Score:1)
At least there is a simple FixIt that blocks it (Score:1)
Which is way better than having an advisory and then having to wait weeks for a fix that requires a reboot,
Re: (Score:1)
The FixIt is only for 32-bit and can't be deployed, must be installed. Fanguish.
Internet Explorer 6? (Score:4, Insightful)
Even Microsoft sent flowers to the mock funerals [theregister.co.uk]. And now they're digging out the grave to patch a corpse?
Re:Internet Explorer 6? (Score:4, Interesting)
Even Microsoft sent flowers to the mock funerals [theregister.co.uk]. And now they're digging out the grave to patch a corpse?
You can be pretty sure they would rather not have to work on it, but they've committed to supporting it until Spring 2014.
They've made a rod for their own back with that one, but that's how it is.
The really exciting bit will be when IE6 support finally does come to an end. I'd be willing to bet there are people who've found expoits but are holding back from using them until then. My bet is that anyone still using IE6 on the day of the last security patch will be hacked into oblivion by the end of that week.
Re: (Score:3)
Actually IE6 is supported until July 2015 if you count Server 2003. And BTW IE7 is supported until January 2020 if you count Server 2008. I wonder how much it costs to support each version of IE for MS.
Re: (Score:1)
Re: (Score:3)
It is because back in the 1990s Microsoft intermingled parts of their OS and browser and insisted their browser was "integrated" in such a way that it could not be removed.
As everyone can clearly see now, this was a dumb thing to do. They did it purely to dissuade vendors from bundling other competing browsers. But now they are committed to supporting the OS and browser as the same piece of software.
Had they not "integrated" the products, even if they had bundled them, they could have chosen to EOL the bro
Pretty good in general (Score:4, Informative)
Re: (Score:2)
So wait, Microsoft can be blamed for both Winodws8 AND climate change shills?!
Talk about focusing on your core competency! MS is Genius!
Re: (Score:2)
Just like you didn't hear about the ~20k people that died of starvation today; it's not news if it happens every day.
Re: (Score:2)
Things like this happen, but I have to say that these days Microsoft has mostly taped Windows together quite well. We don't anymore see sensational headlines like "Blaster worm infects millions of computers"
Hmm, well, before Snowden we didn't see any headlines like "NSA is beyond creepy, LoveINT: using PRISM spying on romantic interests?"
I guess the spying just wasn't happening until the headlines appeared. Similarly, I guess all the unpatched exploits sitting in my
/with/great/power/comes/great/responsibility/ directory don't exist either. I mean, it's not like I didn't inform MS about them and they just haven't patched them. I bet I'm the only person on the planet capable of discovering multiple remote
Re: (Score:1)
About the on
No sensational headlines? (Score:4, Interesting)
Botnet Command and Control map:
https://www.shadowserver.org/wiki/pmwiki.php/Stats/BotnetMaps#botnet [shadowserver.org]
Re: (Score:2)
There have been reports on 58 different remote code execution vulnerabilities [nist.gov] in Internet Explorer 10 in 2013 alone. I would hardly call that "taped together quite well".
Re: (Score:2)
Chrome the favoured browser on /. had a fair share of remote execution vulnerabilities over the last year or so. I really wish MS would provide 2 versions of their IE. One of end users and one for Enterprise. The boat load of extra security features in IE = large gaps to cover in QC... Just my 2 cents. I don't really care what browser people use as long as it works with our internal applications. Currently our internal apps support all 3 major browsers. Safari is black listed due to it's known issues with A
Why didn't they wait till after April 2014? (Score:1)
The bad guys could have kept this secret till after the end-of-life for XP and made a mint.
Re: (Score:2)
Re: (Score:2)
IE10 is available for Win7 - in fact, you need to apply an "IE10 Blocker" to keep MS Automatic Updates from forcing it down your throat.
Granted, from my experience, IE10 on Win7 is a bit different under the hood from IE10 on Win8 - I've run into quite a few issues where there was a problem in IE10 on Win7, but it was ok on Win8 - or vice versa.
Re: (Score:2)
The bad guys could have kept this secret till after the end-of-life for XP and made a mint.
Economics 101: That which is in increasing supply is priced lower.
Exploits are caused by programming mistakes. In Windows there is a near boundless supply of exploit vectors, due to the quality of MS code... The only reason folks can sell Windows exploits at all is because security researchers are providing the labor to mine the exploits. Dirt is not scarce. You pay for dirt because of the labor others perform to move it about. It's the labor which is scarce, not the exploit vectors.
The limiting fa
IE 11? (Score:1)
I thought IE 10 and after were sand-boxed? Or is it the nature of the buffer overrun that the injection gets CPU level access?
According to the advisory they only get current user-level access. How do they run a buffer overrun exploit that actual stays in the user-context and doesn't go all the way to the CPU?
overwrites previously allocated virtual memory (Score:3)
It sounds like the destruction of objects is incomplete, so the attacker can still write to that area of memory. It's certainly possible that it's writeable BECAUSE it's still associated with the process, which mean it runs in the context of that process. Additionally, it's likely that while the attacker can write to the memory, they can't arbitrarily execute it directly. Rather, they have to cause IE to execute it, in which case it would run with the privileges IE has when IE runs it.
A security problem
Re: (Score:2)
A security problem there is that since IE4, IE has been integrated with the system shell. Therefore, IE privileges are shell privileges - anything the user can do, the browser can do. For this reason, I much prefer a browser that is only a browser, not another view of the system shell. A browser that's just a browser can only screw up web pages, not the entire system.
Huh? All process you start after log in have the same privileges as the user you are logged into.
Re: (Score:2)
My language was unclear. In Explorer, you can go to "My Computer" and choose "Format Drive". Windows Explorer IS Internet Explorer, showing a different menu bar.
In Chrome, Firefox or Seamonkey, there is no "format drive" function. Browsers don't need, and should not have, the ability to reformat your hard drive. That decision to combine the system shell with the browser is the underlying cause of the severity of many Explorer security issues.
Re: (Score:2)
That decision to combine the system shell with the browser is the underlying cause of the severity of many Explorer security issues.
Evidence?
Re: (Score:2)
Here are 1.3 million pieces of evidence:
https://www.google.com/search?q=IE+security+zone+exploit [google.com]
As explained US_CERT, the US Computer Emergency response team:
> There are a number of significant vulnerabilities in technologies relating to the IE domain/zone security model,
> local file system (Local Machine Zone) trust, the Dynamic HTML (DHTML) document object model (in particular,
> proprietary DHTML features), the HTML Help system, MIME type determination, the graphical user interface (GUI),
> and
Re: (Score:2)
I think they locked down the local machine zone in XP SP2: http://blogs.msdn.com/b/ieinternals/archive/2011/03/23/understanding-local-machine-zone-lockdown-restricted-this-webpage-from-running-scripts-or-activex-controls.aspx [msdn.com]
Re: (Score:2)
You believed the bulls^H^H hype?
I liked that Microsoft admitted IE8 and IE9 were being hit, the implication being that IE10 is perfectly ok, completely unaffected and you should upgrade, but they're still going to patch it, you know, just to be on the safe side...
Re: (Score:2)
A buffer overrun does not by nature imply one can escalate privileges beyond the context of the user the process is running as.
Most modern operating systems protect the memory region a process has been assigned to run in by the kernel. This is partially implemented with hardware support from the MMU so if the kernel has setup the hardware properly there are few ways for things to go wrong. In general a process cannot read or write to a memory region it does not own. When it tries it will be blocked and a
Incomplete headline (Score:2)
New IE Remote Code Execution Vulnerability Discovered... 3 years ago, reported to Microsoft, that reported it to the NSA, that took advantage of it all that time. Now a new, safer backdoor that only they should exploit is being deployed thru the fix for this vulnerability.
Is all those new slashdot redesigns, headlines can't hold all the relevant information anymore.
guess (Score:1)
What's Internet Explorer? (Score:2)