Hold in there, Internet Explorer peeps: Gaping zero-day fix coming Tues
Microsoft is preparing to close a wide-open security hole in Internet Explorer – a vulnerability state-backed spies are exploiting to mine organisations across Asia.
A update to fix the flaw is among four critical patches Redmond has lined up for the October edition of Patch Tuesday, due next week. Versions 6 through to 11 of the web browser are known to be vulnerable.
In fact, the bug itself is quite an interesting case study: modern Windows kernels attempt to randomise the layout of software in memory and mark the areas containing just data as non-executable, which in theory is supposed to make life extremely difficult for hackers.
But the web page, in this case, can coax IE into loading a Microsoft Office library that snubs address space layout randomisation (ASLR). This sits in a known region of memory, allowing the attack code to initially hop around the library and use instructions within it to grant itself permission to execute its payload of code.
Exploited since August
The vulnerability first came to public attention late last month when targets in Japan were attacked by miscreants exploiting this vulnerability. Security biz FireEye published an alert about the infiltration attempts on 23 September, and claimed that assaults using the same bug in Microsoft’s browser software started around 23 August.
Redmond had realised there was a problem, though not its seriousness, days before FireEye sounded the alarm. Microsoft published technical details and workarounds to defend against the flaw on 17 September.
Security researchers have since linked the same CVE-2013-3893 bug to multiple attacks by various state-sponsored hacking crews against targets in Taiwan and elsewhere in the Far East. In this context the patch for Internet Explorer versions 6 to 11, due to arrive next Tuesday, can’t come a day too soon.
October 2013 marks the tenth anniversary of Microsoft’s regular security patch rollouts, Patch Tuesday. Alongside the critical IE update, the world’ll get three similarly critical security fixes for Windows that affect the vast majority of deployed platforms except Windows Server 2012 R2 and Windows RT 8.1. Everything from Windows XP up to and including Windows 8 and Windows RT will need patching.
Redmond’s security gnomes are also fuelling up four lower severity security bulletins, all rated as “important”. Microsoft Office, Microsoft Silverlight 5 and Redmond’s Sharepoint portal server software will all need patching as a result of security fixes due to arrive on 8 October.
More details will be released once the updates are deployed next week. In the meantime, Microsoft’s pre-release notice provides more details of the affected software packages.
Wolfgang Kandek, CTO of Qualys, commented: “The recent [Internet Explorer] 0-day … is certainly the top-priority patch for next week and it affects all versions of Internet Explorer from 6 to 11. Fortunately, attack volume using this vulnerability has continued to be low and this has given Microsoft the opportunity to do a full test cycle on all possible combinations of operating systems and target sites.”
Adobe – fresh from warning about a compromise on its website that might have exposed the IDs, password hashes, and encrypted credit card information of nearly three million customers – separately announced plans to deliver a solitary patch for Acrobat 11.0.4 and PDF Reader 11.0.4 on Windows. More details can be found in Adobe’s advisory here. ®