Skip to content Skip to sidebar Skip to footer

New zero day vulnerability identified in all versions of IE

The flaw, which is being leveraged in 'limited, targeted attacks,' allows remote code execution, Microsoft warns.



A new zero day vulnerability that resides in all versions of Internet Explorer has been spotted in the wild, Microsoft confirmed late Saturday.


The vulnerability, which could allow remote code execution, is being used in 'limited, targeted attacks,' according to an advisory issued by Microsoft. While all versions of the web browser, IE 6 through 11, are affected by the vulnerability, attacks are currently targeting IE versions 9, 10 and 11, according to security firm Fire Eye, which first reported the flaw Friday.


The attack leverages a previously unknown 'use after free' vulnerability -- data corruption that occurs after memory has been released -- and bypasses both Windows DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) protections, according to Fire Eye.


An attack could be triggered by luring visitors to a specially crafted web page, Microsoft explained.


'The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated,' Microsoft said. 'The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.'


Microsoft said it is investigating the vulnerability and may issue an out-of-cycle security update to address the issue.


Fire Eye said the flaw was significant because it affects more than a quarter of the total browser market.


'Collectively, in 2013, the vulnerable versions of IE accounted for 26.25% of the browser market,' Fire Eye said in its advisory.


Post a Comment for "New zero day vulnerability identified in all versions of IE"