Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

IE Bug Can Be Exploited Via E-mail
TechWeb ^ | September 21, 2006 | Gregg Keizer

Posted on 09/21/2006 5:31:55 PM PDT by Eagle9

Exploits against the unpatched vulnerability in Microsoft's Internet Explorer are increasing and attackers are gathering momentum, researchers said Thursday. They warned that the problem would become worse if cyber criminals attack via e-mail next.

"It might come to nothing, but it feels like a storm's coming," said Roger Thompson, the chief technology officer at Exploit Prevention Labs. "The potential is there. Call it a storm watch, not a storm warning."

At least two different exploits have appeared this week, said Thompson, one linked to the Russian-made hacker exploit kit called WebAttacker, the other posted early Thursday on the xSec gray-hat vulnerability research site. That second exploit can launch remote code without using JavaScript, as did the original inserted in the WebAttacker kit; it's more dangerous for that reason.

"The xSec exploit doesn't work as posted," said Thompson. "It only crashes the browser. But it looks like it would be easy to turn it into a working exploit."

Worse, the current attack vector -- malicious Web sites that infect only those who happen to view one of their pages -- may be replaced by a wide scale attack carried out by e-mail, said Ken Dunham, the director of iDefense's rapid response team.

"The newest exploit works with e-mail," said Dunham. "We took the newest version of Outlook, all patched, and the exploit crashed it." With some help from iDefense researchers, however, the exploit was able to execute other code. That means e-mail clients that preview HTML messages using the IE rendering engine are at risk. Just previewing a message could result in a computer hijacked by a bot or loaded with adware, spyware, or other malicious code.

"You would be attacked immediately, as soon as the preview is rendered," said Dunham.

Dunham's surer than Thompson that the VML vulnerability will soon explode. "It's imminent. I would not be surprised if a small number of e-mails were already being sent to companies or governments."

Dunham cited the WMF (Windows Metafile Format) vulnerability of late December 2005 to the current situation. "Within 24 hours, targeted e-mail attacks were made against the Korean government and the U.K. Parliament. I think [the VML vulnerability] will rival WMF." Dunham said. "It's trivial to change."

An e-mail attack was also on Thompson's mind. "I'm watching some big spam runs that are linking to older versions of WebAttacker," he said. "Some of these sites use the power of spam to magnify their attacks, and the power of the Web to draw in people." It would be very easy, Thompson said, for a spammer to simply insert a link to a URL hosting the newest edition of WebAttacker -- the edition with the VML exploit -- in the junk mail he sends out.

"It would be nice if Microsoft released a patch," he added. But there are no indications that Microsoft will break from its regular security update schedule, which is set to release fixes on Oct. 12, two-and-a-half weeks away.

For Dunham, it wouldn't be a stretch to assume that slick, sophisticated cyber criminals will target specific organizations -- companies, universities, and government agencies -- with e-mail infections. "There are people out there with a military or state or political agenda. They have targets, and they've identified those targets. All they're doing is looking for a way to compromise those computers."

The motivation? One of the oldest in the book: Money. "There is a market in the underground for corporate or government secrets," said Dunham. "An attack [like this] could even threaten a country's national security."

Microsoft has faced similar situations this year, and patched out-of-cycle only once, against the WMF bug in early January, and then only after the number of sites hosting an exploit ballooned in just days. "If anything breaks, I think they will release a patch," said Thompson. "But it's not a storm yet."


TOPICS: Technical
KEYWORDS: downloadfirefox; email; exploit; ie; internetexploder; lowqualitycrap; malware; microcrap; microsoft; microsoftsecurity; outlook; spyware; windows
Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 next last
To: Eagle9

bump


21 posted on 09/21/2006 6:29:31 PM PDT by khnyny (God Bless the Republic for which it stands)
[ Post Reply | Private Reply | To 1 | View Replies]

To: COEXERJ145

So maybe it's 99.99% written for Windows and the rest for everything else.

Besides, anything targeted for a Linux box would need root access to do major damage. The typical Linux user isn't running as root unless he has too.


22 posted on 09/21/2006 6:32:23 PM PDT by bws53
[ Post Reply | Private Reply | To 20 | View Replies]

To: bws53

Well, I'm no expert on Linux but there are viruses that go after Macs. At work, I see a virus alert from our computer people warning everyone who uses a Mac to watch out for a new virus.


23 posted on 09/21/2006 6:37:53 PM PDT by COEXERJ145 (Free Republic is Currently Suffering a Pandemic of “Bush Derangement Syndrome.”)
[ Post Reply | Private Reply | To 22 | View Replies]

To: observer5
It is amazing that nobody has started a class-action lawsuit against Micro$oft for costing BILLIONS to the US and world economy

Uh, it's because most people blame the hackers for viruses, not Microsoft. Microsoft = users, either you help them or you hurt them with new software.

24 posted on 09/21/2006 7:21:50 PM PDT by Golden Eagle (Buy American. While you still can.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: COEXERJ145
Well, I'm no expert on Linux but there are viruses that go after Macs

To date there have been NO reported, confirmed virus or other malware attacks against Mac OS X. What you're hearing are rumors. Just ignore them. Better yet, get a Mac and stop worrying completely.

25 posted on 09/21/2006 7:57:44 PM PDT by doc11355
[ Post Reply | Private Reply | To 23 | View Replies]

To: doc11355

I despise Macs. I've used them enough at work and would never own one.


26 posted on 09/21/2006 7:58:48 PM PDT by COEXERJ145 (Free Republic is Currently Suffering a Pandemic of “Bush Derangement Syndrome.”)
[ Post Reply | Private Reply | To 25 | View Replies]

To: bws53
Stick with FF. Better yet, ditch Windows.

Nice thought, but in the business world, Mac and Linux affordable accounting apps are pretty scarce. I would also need a Linux equivalent to Sound Forge (audio editing software). It's not all word processing and spreadsheets for some of us.
27 posted on 09/21/2006 8:03:25 PM PDT by sittnick (There is no salvation in politics.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

28 posted on 09/22/2006 5:46:59 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: COEXERJ145
something the Microsoft bashers don't realize. If 90% of us used Linux or Apples, then 90% of the viruses and spyware would be made for those systems.

Yeah, the NBM crowd's dream. The difference is that they wouldn't work on those other systems because the security model is actually coherent, and the applications are NOT part of the operating system.

Duhhhhh....

29 posted on 09/22/2006 7:20:39 AM PDT by TechJunkYard (if you've ever seen my house..)
[ Post Reply | Private Reply | To 16 | View Replies]

To: observer5
Because Apple / Ipod users are whiny lib/artsy types "wha wha - I have scratches on my toy"

Where are Window's users are corporations & power users that know how to really use a tool (and can handle more than 1 mouse button). If/when they get an error, they know how to deal with it instead of whining and starting lawsuits.

[dons flameproof suit]
30 posted on 09/22/2006 7:27:40 AM PDT by PissAndVinegar
[ Post Reply | Private Reply | To 4 | View Replies]

To: bws53
When will people learn to stop using I.E?

That's the fun part. There are many programs out there that use IE to render HTML, so even if a person stops using IE to protect himself he may not know that other programs are using IE under the hood, leaving him vulnerable.

31 posted on 09/22/2006 7:42:20 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 9 | View Replies]

To: sittnick
For a Linux sound editing software, use Audacity.

Accounting apps may be a bit more difficult to come by.

Regards, Ivan

32 posted on 09/22/2006 7:43:35 AM PDT by MadIvan (I aim to misbehave.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: sittnick
I use Firefox, but both the Windows updater and Outlook use IE.

First, dump Outlook and use Thunderbird. Second, go into your IE settings, on the Security tab. Set the Internet zone to the high-security mode, go in and make sure everything is completely disabled. Same thing for Local Intranet and Restricted Sites. Then go to Trusted Sites and make sure the only thing in there is the Windows Update site.

It's not 100%, but it will help narrow your window of vulnerability if you never use IE.

33 posted on 09/22/2006 7:46:51 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 13 | View Replies]

To: sittnick
Nice thought, but in the business world, Mac and Linux affordable accounting apps are pretty scarce.

I'm not saying any of them suit you, but they are out there. I believe MyBooks works on all three platforms. Then there's MYOB and Liquid Ledger. Others are Java server-based, so will work on Mac or Linux.

34 posted on 09/22/2006 7:52:33 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 27 | View Replies]

To: gesully
We are in the mortgage business and most of the online underwriting, credit reporting agencies, and other entities require us to use IE.

To narrow your vulnerability, you can use Firefox with the IE Tab extension. With a click it'll open a tab that is rendered by IE. You can also specify certain sites that will always be rendered by IE. Otherwise, you just use Firefox.

35 posted on 09/22/2006 7:55:40 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 18 | View Replies]

To: Eagle9

How about Firefox?


36 posted on 09/22/2006 7:57:09 AM PDT by RobRoy (Islam is more dangerous to the world now that Naziism was in 1937.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bws53

I use IE at work. I have no choice. All of my other computers use Firefox and have for quite some time. I learned of it here at Freerepublic, of course.


37 posted on 09/22/2006 7:58:23 AM PDT by RobRoy (Islam is more dangerous to the world now that Naziism was in 1937.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: COEXERJ145
Well, I'm no expert on Linux but there are viruses that go after Macs.

There have been experimentals and proofs of concept, but none have been able to survive and propagate in the wild. The one successful infection I know of is a guy who downloaded a file that claimed to be a pirated MS Office off a p2p network. He went to install it, purposely typed in the admin password to let it install, and watched it wipe out his user account. No OS can protect itself from people that dumb.

It didn't affect the rest of the system though. Access to the root account to do that is disabled by default, and it takes a specific procedure to enable it, never going to happen by accident.

38 posted on 09/22/2006 7:59:55 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 23 | View Replies]

To: COEXERJ145
Yeah, that is something the Microsoft bashers don't realize. If 90% of us used Linux or Apples, then 90% of the viruses and spyware would be made for those systems.

What most Microsoft defenders don't realize is that the above is complete and total hogwash.

 Firefox now has 10% of browser market share. While 10% may not sound like much it represents a huge number of users when you consider the total number of folks on the net. That also doesn't take into consideration that many people fake their browser responses to make it seem as though they are using IE so stupid websites that require IE for no legitimate reason will work.

 Let's take one case in point to show how bogus the concept of "too few users to matter" really is. There are people out there who will write viruses to muck things up just because they can.

Consider the Witty Worm.

From the friendly article:

On Friday March 19, 2004 at approximately 8:45pm PST, an Internet worm began to spread, targeting a buffer overflow vulnerability in several Internet Security Systems (ISS) products, including ISS RealSecure Network, RealSecure Server Sensor, RealSecure Desktop, and BlackICE. The worm takes advantage of a security flaw in these firewall applications that was discovered earlier this month by eEye Digital Security. Once the Witty worm infects a computer, it deletes a randomly chosen section of the hard drive, over time rendering the machine unusable. The worm's payload contained the phrase "(^.^) insert witty message here (^.^)" so it came to be known as the Witty worm.

...

Witty infected only about a tenth as many hosts than the next smallest widespread Internet worm. Where SQL Slammer infected between 75,000 and 100,000 computers, the vulnerable population of the Witty worm was only about 12,000 computers.


Note in the above that the entire population of vulnerable computers was just 12,000, an insignificant number of hosts when you consider how many devices are on the internet.

The Victims:

The vulnerable host population pool for the Witty worm was quite different from that of previous virulent worms. Previous worms have lagged several weeks behind publication of details about the remote-exploit bug, and large portions of the victim populations appeared to not know what software was running on their machines, let alone take steps to make sure that software was up to date with security patches. In contrast, the Witty worm infected a population of hosts that were proactive about security -- they were running firewall software. The Witty worm also started to spread the day after information about the exploit and the software upgrades to fix the bug were available.

O.k., so you have a small pool of vulnerable hosts, and the users at least have the presense of mind to be running a firewall, yet someone took the time to craft and deploy this worm.

Are you sure you still want to claim that there just aren't enough Linux or OSX users out there to make it a tempting target?

That's not even taking psychology into account. There are groups out there who do this kind of thing for fun (and sometimes profit). The bragging rights to having created the first successful OSX worm should be tempting enough if it were as easy a target as MS-Windows apparently is.

39 posted on 09/22/2006 9:14:37 AM PDT by zeugma (I reject your reality and substitute my own in its place. (http://www.zprc.org/))
[ Post Reply | Private Reply | To 16 | View Replies]

To: zeugma

What most Microsoft haters won't admit is that any program can be hacked and sooner or later, it will be.


40 posted on 09/22/2006 9:18:13 AM PDT by COEXERJ145 (Free Republic is Currently Suffering a Pandemic of “Bush Derangement Syndrome.”)
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson