Internet Explorer users face new zero-day threat
Just before Thanksgiving Day, Microsoft released a security advisory on a vulnerability affecting Internet Explorer 6 and 7 browsers, based on "new public reports."
A new zero-day Internet Explorer bug greeted information technology pros returning from the holiday break.
Just before Thanksgiving Day, Microsoft released a security advisory on a vulnerability affecting IE 6 and IE 7 browsers, based on "new public reports." Browser versions that aren't affected include IE 8 and IE 5.01 Service Pack 4, according to Microsoft.
Microsoft is continuing to investigate the bug, which allows an attack based on the deletion of a cascading style sheet (CSS) object. The security bulletin indicated that IE 6 SP1 on Windows 2000 SP4 may be affected. Other affected browsers could include IE 6 and IE 7 running on Windows XP, Windows Vista, Windows Server 2003 and Windows Server 2008.
Microsoft's security advisory explained that hackers can potentially run malicious code after a CSS object gets deleted.
"It is possible under certain conditions for a CSS/Style object to be accessed after the object is deleted," the bulletin states. "In a specially crafted attack, Internet Explorer attempting to access a freed object can lead to running attacker-supplied code."
The bulletin adds that users still have to be diverted to a malicious Web page in order for the attack to occur.
IT pros need to have preventive measures in place, both for this bug and in general, according to Paul Henry, security and forensic analyst at Lumension.
"The latest Internet Explorer zero-day threat will unfortunately catch many off guard and will have a significant impact on many organizations that are still relying on outdated defenses," Henry said. "Vendor software vulnerabilities are not going away and zero-day threats will continue to plague even those organizations that have the best of the best in flaw remediation plans in place."
The security advisory offered a few workarounds for the issue until the vulnerability is patched. The workarounds involve changing IE's security zone settings, configuring active scripting settings in IE and turning on data execution prevention in the browser.
Microsoft explained that protected mode, available in IE 7 running on Windows Vista, "limits the impact of the vulnerability." Also, there is some protection for those running IE on Windows Server 2003 and Windows Server 2008. By default, those operating systems use Microsoft's enhanced security configuration, which sets IE's Internet zone security level to "high."
To date, there's no word on when a patch will arrive. It could appear with Microsoft's monthly patch release or in an out-of-band fix.
NEXT STORY: ICF makes cybersecurity move with acquisition