Threat Level: green Handler on Duty: Brad Duncan

SANS ISC: Information Disclosure Vulnerability in Internet Explorer - SANS Internet Storm Center SANS ISC InfoSec Forums


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Information Disclosure Vulnerability in Internet Explorer

Microsoft just publish KB Article 980088 [1] in response to the recently announced vulnerability in Internet Explorer. Microsoft confirms that it is possible for a malicious website to read files from the clients computer. All versions of Windows and Internet Explorer appear to be affected.

There is currently no patch for this problem. Microsoft advices users to set the Internet and Local Intranet security zone settings to "High". This will cause a prompt before running ActiveX Controlls and active scripting.

The attacker needs to know the file name. However, a typical target for this vulnerability would be a configuration file which is typically located at a predictable location.

[1] http://www.microsoft.com/technet/security/advisory/980088.mspx

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

I will be teaching next: Defending Web Applications Security Essentials - SANS Munich July 2019

Johannes

3553 Posts
ISC Handler
"All versions of Windows and Internet Explorer appear to be infected."

You might want to change that to "affected"...
e.b.

16 Posts
No, "infected" sounds better.
e.b.
6 Posts
Come on...vulnerable, not infected. What are you going to tell your end users, other than use a different browser?
Richard

4 Posts
Thanks Eb, changed the diary.
Mark

391 Posts
ISC Handler
does anyone have snort signature for this ?
Mark
1 Posts
I snorted when I read "All versions of Windows and Internet Explorer appear to be infected." but I'm guessing that's not what you're looking for. :)
Mark
12 Posts
If you want the real info on this vulnerability go here:
http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag
It will actually give you some idea of what you are dealing with.
NoLemmingsPlease

5 Posts
The IE exploit will probably be delivered through heavily obfuscated javascript, so I imagine a Snort signature would be very difficult to write. HIPS/Endpoint protection products are probably better equiped to detect and block it.
Shawn

29 Posts

Sign Up for Free or Log In to start participating in the conversation!