Last Updated: 2014-04-28 00:06:08 UTC
by Tony Carothers (Version: 1)
Microsoft released a Security Advisory yesterday(1) which impacts Internet Explorer versions 6 through 11, taking advantage of a vulnerability in Flash. The Microsoft advisory notes that â??The vulnerability is a remote code execution vulnerability. â?¦ The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.â?ť
This exploit is currently being seen in limited attacks at this time against versions IE9-IE11, according to the security vendor Fireeye(2), who is working with MS at this time. At the time of this writing, a patch is not yet available.
Actions to take to limit the impact of the vulnerability:
- Install EMET . According to Fireeye's testing, EMET 4.1 and 5 do break the exploit.
- Disable Flash . Note that IE 10 and later on Windows 8 do include Flash. But you can still disable it. This is an IE vulnerability but Flash is needed to exploit it and bypass some of the protection techniques implemented in newer versions of IE/Windows.
- Enable the Internet Explorer "Enhanced Protection Mode" (EPM) which became available in Internet Explorer 10. But it may break some plugins.
tony d0t carothers --gmail