IE Zero-Day Vulnerability Exploiting msvcrt.dll

Published: 2013-11-09
Last Updated: 2013-11-11 23:41:53 UTC
by Guy Bruneau (Version: 3)
4 comment(s)

FireEye Labs has discovered an "exploit that leverages a new information leakage vulnerability and an IE out-of-bounds memory access vulnerability to achieve code execution." [1] Based on their analysis, it affects IE 7, 8, 9 and 10.

According to Microsoft, the vulnerability can be mitigated by EMET.[2][3] Additional information on FireEye Labs post available here.

Update: FireEye Labs provided additional information on the recently discovered IE zero-day exploit that is currently in the wild and has been named Trojan.APT.9002 (aka Hydraq/McRAT variant). They have published additional information on the Trojan that only runs in memory and leave very little artifacts that can help identify infected clients. Additional information about the Trojan can be found here which also includes a list of domains, MD5 hash and User-Agent information.

Update 2: Microsoft is releasing tomorrow a fix for this vulnerability (CVE-2013-3918) affecting Explorer ActiveX Control as "Bulletin 3" as MS13-090 listed in the November Microsoft Patch Tuesday Preview.



Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu

4 comment(s)


Microsoft should have integrated EMET into Windows 8, and they should have it as an optional update either in the next Win7 SP or during a Patch Tuesday.
It's nice to know that we don't have to wait for EOL on Windows XP to keep enjoying the love.
Suspicious that the fix is in the current cycle.

Says that the actor here knew the vuln was about
to be patched, that it's value therefore had dropped
to "throwaway," and they used it for targets where
the risk of discovery was high.

Same is true of CVE-2013-1690 that the FBI used to
unmask TOR users. The patch was already in the
general Firefox distribution when the exploit was
deployed against the not-yet updated TBB
derivative Firefox.

More about that here

Diary Archives