Tuesday, December 23, 2008

MyCERT Special Alert - Microsoft Internet Explorer 7 (IE7) 0-day Exploit

Initial Release: 11th December 2008
Revised Version: 12th December 2008

2nd Revised Version : 18th December 2008

1.0 Introduction

MyCERT has received reports from Microsoft and other security teams regarding the availability of a 0-day exploit targeting Microsoft Internet Explorer 6, 7 and 8. Microsoft has already released security update to fix the problem [1].

Users should take note that the recent cumulative fix released by Microsoft (http://www.microsoft.com/technet/security/bulletin/ms08-073.mspx) does not protect them from this exploit, thus users are highly encouraged to apply the security fix immediately.

2.0 Impact

The exploitation requires users to visit a web site that contains the exploit code. Successful exploitation allows remote code execution by the attacker.

3.0 Affected Products and Platforms

Windows Internet Explorer 7 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, Windows Vista, Windows Vista Service Pack 1, and Windows Server 2008. Microsoft Internet Explorer 5.01 Service Pack 4, Microsoft Internet Explorer 6 Service Pack 1, Microsoft Internet Explorer 6, and Windows Internet Explorer 8 Beta 2 on all supported versions of Microsoft Windows.

4.0 Mitigation

Users are advised to promptly apply the security update released by Microsoft at the mentioned URL [1].

If users are not able to apply the security update at the current time, users are encouraged to apply mitigation techniques proposed by in [2] if they wish to use Internet Explorer 6, 7 and 8. Protected Mode in Internet Explorer 7 and Internet Explorer 8 in Windows Vista limits the impact of the vulnerability.

Please refer at: http://www.microsoft.com/windows/windows-vista/features/IE7-protected-mode.

Users may also consider using alternative browsers such as Mozilla Firefox or Opera while waiting for the problem to be resolved. In addition, system administrator may block traffic from the internal network going to known IE7 exploit sites that are published by ShadowServer Foundation in [3] or use Snort IDS signatures made available by Emerging Threats in [7].

5.0 References

[1] Microsoft Security Bulletin MS08-078-Critical

http://www.microsoft.com/technet/security/bulletin/ms08-078.mspx

[2] Microsoft Security Advisory on IE 7 Vulnerability

http://www.microsoft.com/technet/security/advisory/961051.mspx

[3] IE 7 Exploit Sites

http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20081210

[4] SANS Handlers Diary

http://isc.sans.org/diary.html?storyid=5458

[5] Trend Micro Blog

http://blog.trendmicro.com/zero-day-ie-flaw-being-actively-exploited/

[6] Symantec Blog

https://forums.symantec.com/syment/blog/article?blog.id=vulnerabilities_exploits&thread.id=180

[7] Snort Rule for IE 0-day

http://www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_IE_0Day

Users and organizations could contact MyCERT for further assistance or questions.

MyCERT can be reached at:

E-mail : mycert@mycert.org.my
Phone : +603 89926969 (monitored during business hours)
Fax : +603 89453442
Handphone : +60 19 2665850 (24x7 call incident reporting)
SMS : +60 19 2813801 (24x7 SMS reporting)
Business Hours : Mon - Fri 08:30 -17:30 MYT
Web:
http://www.mycert.org.my

Revision History:
Initial Release: 11th December 2008
1st Revision: 12th December 2008

2nd Revised Version : 18th December 2008

No comments: