Internet Explorer Pwned

Internet Explorer

Microsoft’s world has been shaken up recently by a new remote command execution exploit for its premier web browser, Internet Explorer.

Quoting a timeline from eEye’s research on this vulnerability makes it this story more interesting:

11/15/2008 In-The-Wild Exploitation Witnessed By 3rd Party
12/9/2008 Reliable Exploit Code Identified by eEye Research”

The problem is in the code processing XML in Internet Explorer. An attacker can exploit a buffer overflow to execute their own code on the client just by visiting a malicious web page.There are already full exploits for Windows XP and Windows Vista. Apprently, this has been exploited in the wild for some time now. Its too bad that the original bug discoverer didn’t sell his/her code, they probably would have gotten a small fortune (I am talking about totally legitimate agencies, of course).

Also, according to Muts’ Blog, this vulnerability still isn’t patched (Vista updated with latest patches — stated on the blog). Oh Microsoft, we know your good with your Patch Tuesdays and all that stuff, but couldn’t you break down and hand out some emergency patches soon? I mean, should ~50% of the world get owned just in time for Christmas!?

But rapid reader, I bring good news too! Firefox users shouldn’t have a thing to worry about =)

  • hawaii

    Why is there such a fuss about this?? A good AV will detect that kind of flaw!

  • MrGutts

    The Chinese released this flaw I thought (Eeye took the credit) that has been around for more than 6 months. Your AVs have not been catching it because they don’t know what to look for.

    How would you feel a vulnerability has been on the black market for more than 6 months and no one knew about it, aside from US intelligence that doesn’t say a world when they do know something like this..

  • jbrown

    There are hundreds of bugs that only certain people know about, hence the name 0day. But say there is a locked up server somewhere, hosting exploits… there is a certain value 0days hold as well. Targets get old, protections are put in place, new versions may even intentionally and unintentionally remove the vulnerable code.

    One would be wise to assume that all protections put in place CAN and WILL be circumvented, all bugs that can exist are known by somebody, somewhere, and it is only as secret as the people that keep it. If it is going to be released, you’ll see it soon, leaked or proper.