IE 6, 7, 8 + ASLR and DEP Bypass … (Zero-Day Vulnerability)!
December 22nd, 2010
A new Zero-Day Vulnerability just poped-up as a gift for everyone this Xmas!
An attack on this vulnerability will allow unauthorized remote code execution inside the “iexplore.exe” application. The vulnerability resides in a memory corruption within Microsoft’s HTML engine (mshtml). When parsing an HTML page containing a recursive CSS import, a C++ object is deleted and later reused. And a Proof-of-Concept is already available publicly.
Here is what you can do to prevent damages:
- If you want to fix the issue temporarily, use EMET from Microsoft
- Do not open web sites, files or emails from untrusted sources
- If your computer is acting abnormal, get our tools (i.e. RescueCD, FakeAV Remover)
- Apply Microsoft’s Patch when it becomes available
UPDATE (2011/02/09): Microsoft has released a patch to fix the issue. Make sure you apply it as soon as possible (MS11-003).
Categories: General