Attack code published for 'critical' IE flaw; Patch your browser now

Summary:Microsoft has confirmed that this flaw is being used in "limited attacks" but the company has not (yet) updated its MS12-037 bulletin to make it clear that public exploit code is now widely available.

Last week, when Microsoft released the critical Internet Explorer update, the company issued a warning that working exploit code could be released within 30 days.

follow Ryan Naraine on twitter

Less than a week later, an exploit for one of the "critical" browser flaw has been fitted into the freely available Metasploit point-and-click attack tool and samples have been released to Contagio, a blog that tracks live malware attacks.

The addition of the exploit into Metasploit effectively means that cyber-criminals now have access to copy the attack code for use in exploit kit and other mass malware attacks.

'State-sponsored attackers' using IE zero-day to hijack GMail accounts ]

The vulnerability (CVE-2012-1875) is a remote code execution flaw in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

Microsoft has confirmed that this flaw is being used in "limited attacks" but the company has not (yet) updated its MS12-037 bulletin to make it clear that public exploit code is now widely available.

According to McAfee, the live attacks started as far back at June 1, 2012:

The exploit works across all major Windows platforms, including Windows Vista and Windows 7. It leverages return-oriented programming (ROP) exploitation technology to bypass with data execution (DEP) and address space layout randomization (ASLR) protections, and hook-hopping evasion techniques to evade host-based IPS detections. It requires the victim’s system to run an old Java virtual machine that came with a non-ASLR version of msvcr71.dll. If Java is not installed or there is no non-ASLR version of msvcr71.dll in the system, the exploit won’t work, although it will cause IE to crash.

On Windows XP, the vulnerability can be reliably exploited without any third-party component. We found the exploit tried to download and execute a binary from a remote server. The server was hosted by Yahoo and was taken down the same day we reported this to Microsoft.

Patch Tuesday: Microsoft raises alert for dangerous IE, Windows flaws ]

Researchers at AlienVault Labs are reporting the discovery of "several servers hosting similar versions of the exploit."  It also said the exploit supports a wide range of languages and Windows versions (from Windows XP through Windows 7) and appears to be very reliable.

It's important to note that this vulnerability is entirely different from the unpatched IE vulnerability linked to "nation-state attackers" engaged in ongoing attacks against GMail/Windows users.

This video shows the exploit in action in Metasploit.

Topics: Security

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.