A vulnerability has been discovered in Microsofts web browser, Internet Explorer, which could result in remote code execution. If a user views a specially crafted website using Internet Explorer, an attacker could gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.'
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.
Microsoft suggests to apply their Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround", that prevents exploitation of this issue. The link for the workaround is in the Recommendations section below.
- Apply appropriate patches when provided by Microsoft to vulnerable systems immediately after appropriate testing.
- If possible implement Microsofts Fix It solution https://support.microsoft.com/kb/2887505
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.