A vulnerability in Internet Explorer Could Allow Remote Code Execution (288705)

ITS Advisory Number: 
2013-091b
Date(s) Issued: 
Wednesday, September 18, 2013
Date Updated: 
Tuesday, October 8, 2013
Subject: 
A vulnerability in Internet Explorer Could Allow Remote Code Execution (288705)
Overview: 

A vulnerability has been discovered in Microsofts web browser, Internet Explorer, which could result in remote code execution. If a user views a specially crafted website using Internet Explorer, an attacker could gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.

October 8 - UPDATED OVERVIEW:
Microsoft has released a patch for this security advisory in Microsoft Security Bulletin MS13-080.

'
Systems Affected: 
  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

ORIGINAL DESCRIPTION:
A vulnerability has been discovered in Microsofts web browser, Internet Explorer, which could result in remote code execution.ÿ The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.ÿ Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.

Microsoft suggests to apply their Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround", that prevents exploitation of this issue. The link for the workaround is in the Recommendations section below.

October 8 - UPDATED DESCRIPTION:
Microsoft has released a patch for this security advisory in Microsoft Security Bulletin MS13-080.

'
Actions: 
  • Apply appropriate patches when provided by Microsoft to vulnerable systems immediately after appropriate testing.
  • If possible implement Microsofts Fix It solution https://support.microsoft.com/kb/2887505
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Apply the appropriate patch provided by Microsoft to vulnerable systems immediately after appropriate testing.
'
References: 
Microsoft:
https://technet.microsoft.com/en-us/security/advisory/2887505
http://blogs.technet.com/b/msrc/archive/2013/09/17/microsoft-releases-security-advisory-2887505.aspx
https://support.microsoft.com/kb/2887505
Security Focus:
http://www.securityfocus.com/bid/62453
CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893
October 8, 2013 - UPDATED REFERENCES:
Microsoft:
https://technet.microsoft.com/en-us/security/bulletin/ms13-080