Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Microsoft/Windows
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Microsoft Pushes Workaround for IE Emergency
Microsoft Pushes Workaround for IE Emergency

By Jennifer LeClaire
September 18, 2013 10:05AM

    Bookmark and Share
An attacker who successfully exploited a vulnerability in Microsoft's Internet Explorer browser could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
 



Software giant Microsoft just woke up from a bad dream. Redmond is facing a zero-day vulnerability in all versions of its Internet Explorer browser and has rushed an urgent fix for the bug.

Microsoft is officially investigating public reports of the vulnerability and admits it is aware of targeted attacks that attempt to exploit the zero-day flaw in Internet Explorer 8 and Internet Explorer 9. Redmond was fast on its feet to release a workaround known as the "CVE-2013-3893 MSHTML Shim Workaround," to prevent hackers from exploiting the software.

The company said it is dealing with a remote code execution vulnerability. It seems there's a flaw in the way IE accesses an object in memory that has been deleted or hasn't been properly allocated.

"The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer," Microsoft said in a security advisory. "An attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site."

Good News, Bad News

We caught up with Paul Henry, a security and forensic analyst at Lumension, to get his thoughts on the workaround. He told us there's good news and bad news here. The good news is there are many mitigating factors. The bad news is this is a very wide-reaching workaround, affecting all versions of IE across all operating systems, from XP to RT.

"And more bad news: the average user is very susceptible to being hit with this. The average user does not run the restricted sites mode, is not using the Enhanced Security Configuration, and [may be] all too willing to click on phishing emails," Henry said.

"I recommend employing the mitigating factors, as well as advising users about this so they will be less likely to click malicious links until you can apply the [workaround]," he said.

The Mitigating Factors

In its security advisory, Microsoft listed four mitigating factors. For example, IE on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 run in a restricted mode that is known as Enhanced Security Configuration by default.

Also by default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the restricted sites zone. According to the company, the restricted sites zone, which disables script and ActiveX controls, helps reduce the risk that an attacker can use this vulnerability to execute malicious code. If a user clicks a link in an email message, the user could still be vulnerable to exploitation of this vulnerability through the web-based attack scenario. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:





 Microsoft/Windows
1.   Yammer Moved to Office 365
2.   Can One Size Windows OS Fit All?
3.   Microsoft CEO Sees 'Bold' Plan Ahead
4.   Future of Laid-Off MS Employees
5.   MixRadio To Spin Off from Microsoft


advertisement
Microsoft CEO Sees 'Bold' Plan Ahead
With unified Windows for all platforms.
Average Rating:
Design Central to Microsoft Future
New ethos a break from functional past.
Average Rating:
Bing Lets Europeans Be 'Forgotten'
Following in Google's footsteps.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 

Mobile Technology Spotlight
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Is the Amazon Fire Phone a Winner?
A late entry into a packed category of smartphones, Amazon's Fire phone offers a variety of unique features. Now, the reviewers are assessing if they're enough to make the phone stand out.
 
Review: Amazon Fire Offers New Ways To Use Phones
The Fire phone uses Android, but Amazon has modified it to the point that it's barely recognizable. That means the phone offers new ways to navigate, discover and, of course, shop.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.