Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: IE Zero-Day Vulnerability Exploiting msvcrt.dll - SANS Internet Storm Center SANS ISC InfoSec Forums


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
IE Zero-Day Vulnerability Exploiting msvcrt.dll

FireEye Labs has discovered an "exploit that leverages a new information leakage vulnerability and an IE out-of-bounds memory access vulnerability to achieve code execution." [1] Based on their analysis, it affects IE 7, 8, 9 and 10.

According to Microsoft, the vulnerability can be mitigated by EMET.[2][3] Additional information on FireEye Labs post available here.


[1] http://www.fireeye.com/blog/technical/2013/11/new-ie-zero-day-found-in-watering-hole-attack.html
[2] https://isc.sans.edu/forums/diary/EMET+40+is+now+available+for+download/16019
[3] http://www.microsoft.com/en-us/download/details.aspx?id=39273

-----------

Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu

Guy

418 Posts
ISC Handler
Microsoft should have integrated EMET into Windows 8, and they should have it as an optional update either in the next Win7 SP or during a Patch Tuesday.
dayglo

5 Posts Posts
It's nice to know that we don't have to wait for EOL on Windows XP to keep enjoying the love.
Anonymous
Posts
Anonymous
Posts
Suspicious that the fix is in the current cycle.

Says that the actor here knew the vuln was about
to be patched, that it's value therefore had dropped
to "throwaway," and they used it for targets where
the risk of discovery was high.

Same is true of CVE-2013-1690 that the FBI used to
unmask TOR users. The patch was already in the
general Firefox distribution when the exploit was
deployed against the not-yet updated TBB
derivative Firefox.

More about that here

https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html
Starlight

34 Posts Posts

Sign Up for Free or Log In to start participating in the conversation!