A vulnerability has been discovered in Microsofts web browser, Internet Explorer, which could result in remote code execution. If a user views a specially crafted website using Internet Explorer, an attacker could gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.
October 8 - UPDATED OVERVIEW:
Microsoft has released a patch for this security advisory in Microsoft Security Bulletin MS13-080.
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
ORIGINAL DESCRIPTION:
A vulnerability has been discovered in Microsofts web browser, Internet Explorer, which could result in remote code execution.ÿ The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.ÿ Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.
Microsoft suggests to apply their Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround", that prevents exploitation of this issue. The link for the workaround is in the Recommendations section below.
October 8 - UPDATED DESCRIPTION:
Microsoft has released a patch for this security advisory in Microsoft Security Bulletin MS13-080.
- Apply appropriate patches when provided by Microsoft to vulnerable systems immediately after appropriate testing.
- If possible implement Microsofts Fix It solution https://support.microsoft.com/kb/2887505
- Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
- Apply the appropriate patch provided by Microsoft to vulnerable systems immediately after appropriate testing.
https://technet.microsoft.com/en-us/security/advisory/2887505
http://blogs.technet.com/b/msrc/archive/2013/09/17/microsoft-releases-security-advisory-2887505.aspx
https://support.microsoft.com/kb/2887505
Security Focus:
http://www.securityfocus.com/bid/62453
CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893
October 8, 2013 - UPDATED REFERENCES:
Microsoft:
https://technet.microsoft.com/en-us/security/bulletin/ms13-080