A critical vulnerability has been identified in the Microsoft Internet Explorer version 8 and 9. The vulnerability, if successfully exploited will cause the application to crash and could potentially allow an attacker to take control of the affected system. [1]
Essentially, an attacker can trick users into clicking on a URL that will direct the users to a specially crafted web page containing the exploit. However, based on incident reported, the malicious code was embedded to a well known website and start exploiting the visitors.
MyCERT is aware that a '0-day' exploit is available on the Internet at the time of the publication of this advisory. [2]
2.0 Impact
An attacker who successfully exploits this vulnerability will be able to execute codes remotely and gain the same privilege as the user. Unsuccessful attacks may cause denial-of-service (DoS) outcomes. This vulnerability could be exploited to install malware on the user's computer.
3.0 Affected Products
The detail list of the vulnerable products and versions are as below:
- Microsoft Internet Explorer 8
- Microsoft Internet Explorer 9
4.0 Recommendations
As of the writing of this advisory, Microsoft has not released any security patches for this vulnerability. However, users can use the following steps as a temporary workaround if they need to use Microsoft Internet Explorer:
4.1 Windows users are advised to apply the Microsoft Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround. However, FixIt ONLY applies to 32-bit versions of Internet Explorer. User must have security update 2870699 installed for this Fix it to provide effective protection against this issue. Step by step on how to apply Fix it can be found at the following URL:
To enable or disable this Fix it solution, click the Fix it button or link under the Enable heading or under the Disable heading. Click Run in the File Download dialog box, and then follow the steps in the Fix it wizard.
- Microsoft Fix it 51001 - Enable this fix it
http://go.microsoft.com/?linkid=9838025
- Microsoft Fix it 51002 - Disable this fix it
http://go.microsoft.com/?linkid=98380264.2 Windows users are advised to add and enhanced EMET support for Internet Explorer (iexplorer.exe). Step by step on how to add the EMET support for specific application can be found in our Protecting Your Windows Computer with Enhanced Mitigation Experience Toolkit (EMET) tutorial at the following URL:
Configure your EMET to protect either
- C:\program files\Internet Explorer\iexplore.exe
- C:\Program Files (x86)\Internet Explorer\iexplore.exe
4.3 Disable Active Script support in the browser. Active Script can be disabled by referring to the following steps:
On the Tools menu, click Internet Options
Click the Security tab, choose Internet zone and click on Custom Level
Disable the Active Scripting and click OK
Do the same step for Local Intranet Security Zone
4.4 Another option for the recommendation in 4.3 is to configure the Enhanced Security Configuration for Internet Explorer and set the Internet Security Zone and Local Intranet Security Zones to "High".
4.5 Do not browse to untrusted websites or click on untrusted links especially URLs enclosed in e-mails from an unknown sender.
4.6 Browse the Internet through access of a lower privilege user to minimize the impact of the malicious file.
4.7 Consider using alternative web browsers to browse the Internet. Please make sure you use the latest version and stay up-to-date as well.
MyCERT would like to advise the users of Microsoft product to be vigilant of the latest security announcements by Microsoft and ensure that they automatically update the operating systems. The article on how to enable the auto update feature in Microsoft is available at the following URL:
Users may also consider using a vulnerability management tool such as Secunia to ensure that all applications are updated:
MyCERT generally advise users of this product to keep themselves updated with the latest security announcements by the vendor. In case the public receives any suspicious URL, and requires our further analysis, please reach us through the following channels:
E-mail : [email protected] or [email protected]
Phone : 1-300-88-2999 (monitored during business hours)
Fax : +603 89453442
Handphone : +60 19 2665850 (24x7 call incident reporting)
SMS : CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours : Mon - Fri 08:30 -17:30 MYT
Web: https://www.mycert.org.my
5.0 References