Avira Techblog: Zero-Day exploit in Internet Explorer

It appears that another exploit is being actively used to install malware. This time, it appears that there is an exploit in Internet Explorer versions 6 to 9. This means, that all  Windows operating systems until Windows 8 are affected.

Microsoft has acknowledged in the Security Advisory (2757760) that there is a problem and that they are analyzing it. According to Microsoft, the remote code execution vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

According to various researchers, the exploit is used to install the trojan “Poison Ivy”.

The only solution available at the moment for Internet Explorer  is to deactivate Java Script and Active X.  However, doing this basically means that you can’t browse anymore 90% of the websites you usually visit.

It is strongly advised to use other browsers (Chrome, Firefox, Safari) until Microsoft delivers the patch.

Avira researchers are actively working to add detection routines for this exploit in order to  prevent such an infected website to affect the local computer.

An update will come soon.

 

Sorin Mustaca

Data Security Expert

 

 

via Avira – TechBlog http://techblog.avira.com/2012/09/18/zero-day-exploit-in-internet-explorer/en/


© Copyright 2012 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity


Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.

Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch