News
Microsoft Issues IE Patch To Address Zero-Day Threat
- By Jabulani Leffall
- January 21, 2010
Microsoft issued a cumulative "out-of-band" security patch on Thursday for a bug in all versions of Internet Explorer.
The patch notably falls outside of Microsoft's monthly security update cycle. Microsoft is responding to a flaw that has enabled remote code execution (RCE) attacks, particularly on Google and other companies from hackers in China, as described last week.
The release includes two "critical" bulletins, addressing IE on every supported Windows operating system. The first patch resolves a privately reported RCE vulnerability exploited via specially crafted Embedded OpenType font in client applications.
The second patch is the big umbrella hotfix expected to quell the technical problem associated with the Google attack. It fixes all versions of IE, from IE 5 through IE 8, on all supported Windows OSes.
"We've reached a point where we have become numb to 'reports of limited attacks' when vulnerabilities are disclosed publicly," said Sheldon Malm, senior director of security strategy at Rapid7. "This [release] is a great example of how the research community helps to bring real customer needs and vendor actions together."
Both patches will require restarts of the OS to take effect, but they come at the right time.
"Because of these in-the-wild exploits and the amount of media and customer attention on this specific exploit, Microsoft was right in deciding that it was in their customers' best interest to issue this out-of-band patch," said Don Leatham, senior director of solutions and strategy at Lumension.
IE has been subject to patching of late, with the last zero-day bug fix seen in late November. Prior to this latest out-of-band release, Microsoft faced a potentially damaging backlash against the browser, with cabinet leadership in both France and Germany suggesting that people use other browsers than Internet Explorer.
Microsoft and security researchers have recommended upgrading the browser and using a Windows setting called data execution prevention (DEP) to better secure IE. However, Microsoft confirmed on Wednesday that all current versions of Internet Explorer contain a DEP bypass vulnerability, but that IE 6 is the only affected version reported so far. Despite that warning, Microsoft and many other security observers have suggested that DEP can help in stopping the exploit code.
IE 6 is still the most popular Microsoft Web browser many years after its release. More than 20 percent of all Web traffic is associated with IE 6 use, according to Net Applications, which tracks browser market share. Still, Microsoft's newer browsers aren't immune. Joshua Talbot, security intelligence manager at Symantec Security Response, said he is certain that "bad guys are working overtime to create reliable exploits for the other affected versions of Internet Explorer, namely 7 and 8."
The exploit appears to rely on social engineering techniques to take effect, such as directing the victim to a specially crafted Web site for attack.
"Based on our in-the-field detections, this security vulnerability has only been used in a very limited number of targeted attacks so far," Talbot explained. "However they appear to be very high profile attacks. The most likely attack vector used in the incidents seen thus far is targeted e-mails containing legitimate looking attachments or links to Web sites sent to high-level employees. When the attachment is opened, an exploit for the vulnerability springs into action and the computer becomes infected."
DEP is one factor in warding off attacks, but security becomes more effective when DEP is used with Address Space Layout Randomization (ASLR), according to Microsoft and researchers. Newer versions of the browser, such as IE 7 and IE 8, running on Windows Vista and Windows 7 are less vulnerable because they have ASLR.
In addition, Microsoft's newer OSes were designed with a better approach to security, according to Leatham.
"This security bug is a clear, real-world example of the superior security model implemented in Windows Vista and Windows 7," Leatham said. "This whole situation should be a wake-up call to organizations still running Windows XP to accelerate their migration plans."
About the Author
Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.