My next class:

Information Disclosure Vulnerability in Internet Explorer

Published: 2010-02-03. Last Updated: 2010-02-04 02:54:07 UTC
by Johannes Ullrich (Version: 1)
8 comment(s)

Microsoft just publish KB Article 980088 [1] in response to the recently announced vulnerability in Internet Explorer. Microsoft confirms that it is possible for a malicious website to read files from the clients computer. All versions of Windows and Internet Explorer appear to be affected.

There is currently no patch for this problem. Microsoft advices users to set the Internet and Local Intranet security zone settings to "High". This will cause a prompt before running ActiveX Controlls and active scripting.

The attacker needs to know the file name. However, a typical target for this vulnerability would be a configuration file which is typically located at a predictable location.

[1] http://www.microsoft.com/technet/security/advisory/980088.mspx

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

8 comment(s)
My next class:

Comments

"All versions of Windows and Internet Explorer appear to be infected."

You might want to change that to "affected"...
No, "infected" sounds better.
Come on...vulnerable, not infected. What are you going to tell your end users, other than use a different browser?
Thanks Eb, changed the diary.
does anyone have snort signature for this ?
I snorted when I read "All versions of Windows and Internet Explorer appear to be infected." but I'm guessing that's not what you're looking for. :)
If you want the real info on this vulnerability go here:
http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag
It will actually give you some idea of what you are dealing with.
The IE exploit will probably be delivered through heavily obfuscated javascript, so I imagine a Snort signature would be very difficult to write. HIPS/Endpoint protection products are probably better equiped to detect and block it.

Diary Archives