A critical vulnerability has been identified in the Microsoft Internet Explorer. The vulnerability, if successfully exploited will cause the application to crash and could potentially allow an attacker to take control of the affected system. 
This issue is caused by a use-after-free error within the "mshtml.dll" that associated to execCommand function call, which could allow remote attackers to execute arbitrary code via a specially crafted web page. 
Essentially, an attacker can trick users into clicking on a URL that will direct the users to a specially crafted web page containing the exploit.
MyCERT is aware that a '0-day' exploit is available on the internet at the time of the publication of this advisory. 
An attacker who successfully exploits this vulnerability will be able to execute codes remotely and gain the same privilege as the user. Unsuccessful attacks may cause denial-of-service (DoS) outcomes. This vulnerability could be exploited to install malware on the user's computer.
3.0 Affected Products
The detail list of the vulnerable products and versions are as below:
- Microsoft Internet Explorer 7
- Microsoft Internet Explorer 8
- Microsoft Internet Explorer 9
As of the writing of this advisory, Microsoft has not released any security patches for this vulnerability. However, users can use the following steps as a temporary workaround if they need to use Microsoft Internet Explorer:
4.1 Windows users are advised to add the EMET support for Internet Explorer (iexplorer.exe). Step by step on how to add the EMET support for specific application can be found in our Protecting Your Windows Computer with Enhanced Mitigation Experience Toolkit (EMET) tutorial at the following URL:
Configure your EMET to protect either
- C:\program files\Internet Explorer\iexplore.exe
- C:\Program Files (x86)\Internet Explorer\iexplore.exe
4.2 Disable Active Script support in the browser. Active Script can be disabled by referring to the following steps:
On the Tools menu, click Internet Options:
Click the Security tab, choose Internet zone and click on Custom Level:
Disable the Active Scripting and click OK:
4.3 Another option for the recommendation in 4.3 is to configure the Enhanced Security Configuration for Internet Explorer and set the Internet Security Zone to "High"
4.4 Do not browse to untrusted websites or click on untrusted links especially URLs enclosed in e-mails from an unknown sender.
4.5 Browse the Internet through access of a lower privilege user to minimize the impact of the malicious file.
4.6 Consider using alternative web browsers to browse the Internet. Please make sure you use the latest version and stay up-to-date as well.
MyCERT would like to advise the users of Microsoft product to be vigilant of the latest security announcements by Microsoft and ensure that they automatically update the operating systems. The article on how to enable the auto update feature in Microsoft is available at the following URL:
Users may also consider using a vulnerability management tool such as Secunia to ensure that all applications are updated:
MyCERT generally advise users of this product to keep themselves updated with the latest security announcements by the vendor. In case the public receives any suspicious URL, and requires our further analysis, please reach us through the following channels:
E-mail : [email protected] or [email protected]
Phone : 1-300-88-2999 (monitored during business hours)
Fax : +603 89453442
Handphone : +60 19 2665850 (24x7 call incident reporting)
SMS : CYBER999 REPORT <EMAIL> <COMPLAINT> to 15888
Business Hours : Mon - Fri 08:30 -17:30 MYT