News

Zero-Day Exploit for IE Flaw Allows Remote Code Execution

Microsoft released a security advisory late Thursday night to warn customers that it is investigating public reports of a vulnerability in Internet Explorer that could allow a remote attacker to take control of a user's machine over the Internet.

Even as Microsoft's advisory took an unnamed group of security researchers to task for releasing information about the flaw and exploit code publicly, Microsoft itself was scolded by incident handlers at the SANS Institute for providing an infrastructure with IE that allows such attacks in the first place.

The flaw involves a COM object called the Microsoft DDS Library Shape Control, which is provided by the MSDDS.DLL that is installed with Visual Studio 2002 gold and may also be present on systems running Microsoft Office XP Service Pack 3. Customers are not affected if they are using Visual Studio 2002 Service Pack 1, Visual Studio 2003 or Office 2003.

Designed to use a diverse array of ActiveX controls, which are a kind of COM object, Internet Explorer will run any COM object that is referenced by a Web page. COM objects that are not ActiveX controls, such as the Microsoft DDS Library Shape Control, can cause unexpected results.

According to a CERT analysis of the issue, by convincing a user to view a specially crafted HTML document, an attacker can exploit the flaw to execute arbitrary code on the user's machine or cause IE to crash.

What makes the vulnerability especially dangerous is that proof of concept, or exploit code, has been available since Wednesday from an organization called FrSIRT, which stands for French Security Incident Response Team.

"Microsoft, this situation demands a more effective and encompassing solution, it needs to be enabled by default, and it cannot afford to wait for Vista & IE7 to be released."
— "Open letter from the handlers" of the SANS Internet Storm Center.

Several organizations, including FrSIRT and Secunia, rated the vulnerability "critical" or "highly critical." The SANS Internet Storm Center, in its daily Handler's Diary, warned Thursday, "We feel widespread malicious use of this vulnerability is imminent." Microsoft usually doesn't rate the severity of a flaw until it publicly releases a patch.

SANS noted, however, that Microsoft's publication of several effective workarounds should minimize the threat fairly quickly. Microsoft's workarounds include disabling ActiveX controls, which can break other Web-based applications that use legitimate ActiveX controls; set the kill bit for the component, which has no adverse effects on applications but carries the dangers attendant to editing the Registry; unregistering the component, which will break applications that require the component; or modifying the Access Control List, again potentially breaking applications that have legitimate use for the component.

Microsoft lashed out at unnamed security researchers in its advisory: "Microsoft is concerned that this new report of a vulnerability in Internet Explorer was not disclosed responsibly, potentially putting computer users at risk. We believe the commonly accepted practice of reporting vulnerabilities directly to a vendor serves everyone's best interests."

Microsoft's criticism is apparently aimed at FrSIRT, which itself credited an anonymous source for the vulnerability information. Several organizations, including CERT, identified FrSIRT as the first to go public with the information. However, FrSIRT is not the only security organization providing the exploit code. SecurityTracker, for example, also posted the exploit code in full on its Web site.

Incident handlers at the SANS Institute, who weren't involved in spreading exploit code and who joined Microsoft in helping customers handle the issue, leveled criticism at Microsoft over the underlying problem.

In an "Open letter from the handlers," they wrote, "It merits pointing out that this particular vulnerability really isn't 0-day, it's more like 380-day, as the underlying vulnerability has been around for a long time. Microsoft … [and others] have been recommending that users set "kill bits" on individual ActiveX/COM objects for a year now, as an ultimate fix for the issue."

Pointing to this month's Microsoft security update MS05-038, which sets kill bits for a number of COM objects not intended to be accessed through IE, the handlers wrote, "Have we all forgotten the lessons of taking a default-permit stance with regard to defense? The underlying vulnerability is not that javaprxy.dll (MS05-037) or shell32.dll (MS05-038) or msdds.dll can be invoked from a Web page; the real issue is that the MSIE Renderer, which can be invoked from nearly every Microsoft application (Office, Outlook, …) is allowed to access any object within the operating system without any controls whatsoever."

"There should be a default-deny setting, allowing only a white-list of 'known good' ActiveX objects. Microsoft, this situation demands a more effective and encompassing solution, it needs to be enabled by default, and it cannot afford to wait for [Windows] Vista [and Windows Internet Explorer 7] to be released," the handlers wrote. They did acknowledge that Microsoft offers a few tools for technically-savvy users to harden IE against such attacks.

Click here to view Microsoft Security Advisory (906267).

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • How To Replace an Aging Domain Controller

    If the hardware behind your domain controllers has become outdated, here's a step-by-step guide to performing a hardware refresh.

  • Azure Backup for SQL Server 2008 Available at Preview Stage

    Microsoft added the option of using the Azure Backup service to provide recovery support for SQL Server 2008 and SQL Server 2008 R2 when those workloads are hosted on Azure virtual machines.

  • Microsoft Suggests Disabling Old Protocols with Exchange Server 2019

    Exchange Server 2019 with Cumulative Update 2 (CU2) can help organizations rid themselves of old authentication protocols, which constitute a potential security risk.

  • Microsoft Previews New Edge Browser on Windows 7 and Windows 8.1

    Microsoft announced this week that it has released previews of its Chromium-based Microsoft Edge Web browsers for use on Windows 7, Windows 8 and Windows 8.1 systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.