Microsoft fails to patch latest Internet Explorer 8 zero-day exploit

Malware

by Joe Curtis| 22 May 2014

HP’s Zero Day Initiative publishes IE8 flaw details without fix available.

Microsoft has failed to fix an Internet Explorer vulnerability that could give hackers control of people's computers before details of it went online.

The zero-day exploit - details of which are now on the web - means hackers can use phishing attacks to lure PC users to a malicious website that would effectively let hackers take over the victims' computers.

Microsoft was made aware of the flaw in October after a Belgian researcher, Peter Van Eeckhoutte, discovered it.

But it did not fix the weakness before details of the flaw were made public by HP's Zero Day Initiative (ZDI) yesterday.

ZDI's disclosure read: "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

"An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights."

ZDI said the issue exists within the handling of CMarkup objects, and clarified that it had notified Microsoft on May 8 of its intention to publish details of the exploit.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

743 people like this.
0 people follow this.

Malware Intelligence

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.