A vulnerability in Internet Explorer Could Allow Remote Code Execution (288705)

ITS Advisory Number: 
2013-091
Date(s) Issued: 
Wednesday, September 18, 2013
Subject: 
A vulnerability in Internet Explorer Could Allow Remote Code Execution (288705)
Overview: 

A vulnerability has been discovered in Microsofts web browser, Internet Explorer, which could result in remote code execution. If a user views a specially crafted website using Internet Explorer, an attacker could gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.

'
Systems Affected: 
  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.

Microsoft suggests to apply their Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround", that prevents exploitation of this issue. The link for the workaround is in the Recommendations section below.

Actions: 
  • Apply appropriate patches when provided by Microsoft to vulnerable systems immediately after appropriate testing.
  • If possible implement Microsofts Fix It solution https://support.microsoft.com/kb/2887505
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
'
References: 
Microsoft:
https://technet.microsoft.com/en-us/security/advisory/2887505
http://blogs.technet.com/b/msrc/archive/2013/09/17/microsoft-releases-security-advisory-2887505.aspx
https://support.microsoft.com/kb/2887505
Security Focus:
http://www.securityfocus.com/bid/62453
CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893