This article is more than 1 year old
Exploit code for potent IE zero-day bug goes wild
'Fairly reliable'
Updated Exploit code targeting the Internet Explorer vulnerability used against Google and other companies has gone public, increasing the chances that broader attacks will soon follow.
Both the open-source Metasploit framework and the commercial Immunity Canvas software for penetration testers have working exploits that fully compromise computers running earlier versions of the browser. The attacks target a previously unknown invalid pointer reference bug in IE that attackers used to penetrate the defenses of Google and dozens of other companies.
The exploits come as the German Federal Office for Information Security said IE users should switch to an alternative browser until a patch for IE has been made available.
The exploit in Canvas was "fairly reliable" at remotely executing code in tests of IE versions 6 and 7 running on Windows XP SP3, Immunity researcher Kostya Kortchinsky wrote in an email. "It crashed IE 8 and will require a bit more work to get something out of it," he added.
The exploit folded into Metasploit was tested on IE 6 running on the same Windows platform, the framework's chief maintainer, H D Moore, wrote in a blog post.
While the flaw affects all versions of IE except for 5.01 SP 4, security protections built in to more recent versions of the browser and operating system can significantly mitigate the threat. DEP, short for data execution prevention, is enabled by default in IE 8 but must be manually turned on in prior versions. Users of Vista and later versions of Windows should run IE in protected mode, an additional feature that also provides important protection.
We've said it before, and given the particulars of this vulnerability, we'll say it again: security measures like DEP and ASLR, or address space layout randomization, matter. As ugly as this vulnerability is - to say nothing of its ability to remain undetected for nine years - the fact that Windows 7 and IE 8 were able to withstand the "highly sophisticated" attacks that felled Google is testament that Microsoft is making significant progress.
Shortly after this article was first published, Microsoft issued a statement that largely repeated the same mitigation details. But it also said researchers continue to see only "limited targeted attacks affecting Internet Explorer 6." It went on to "encourage" users of IE 6 and 7 to upgrade to the latest version "to benefit from the improved security features and defense in depth protections offered such as data execution prevention and smartscreen."
The advice is sound. If it's at all possible, upgrade to IE 8 now. The computer you save may be your own.
Microsoft hasn't said when it expects to fix the bug. Its next regular update release is scheduled for February 9. Speculation is growing that the company will issue an out-of-band patch.
Moore said the Metasploit maintainers got their hands on the exploit after it was uploaded to Wepawet. Kortchinsky said Immunity researchers believe their exploit is the same one but can't be sure. Anti-virus provider McAfee, which first discovered the exploitation of the zero-day flaw, said here that the public exploits use the same code it has observed.
So far, exploitation of the IE bug has been seen only in highly targeted attacks that hit Google and at least some of the other 33 large companies that experienced similar assaults. With the public release of exploit code, the likelihood of much broader scams targeting the vulnerability are much greater. ®
This article was updated to add reporting and commentary.