Zero-Day exploit in Internet Explorer(Update #2)

It appears that another exploit is being actively used to install malware. This time, there is an exploit in Internet Explorer versions 6 to 9. This means, that all  Windows operating systems until Windows 8 are affected.

Microsoft has acknowledged in the Security Advisory (2757760) that there is a problem and that they are analyzing it. According to Microsoft, the remote code execution vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

According to various researchers, the exploit is used to install the trojan “Poison Ivy”.

The only solution available at the moment for Internet Explorer  is to deactivate Java Script and Active X.  However, doing this basically means that you can’t browse anymore 90% of the websites you usually visit.

It is strongly advised to use other browsers (Chrome, Firefox, Safari) until Microsoft delivers the patch.

Avira researchers are actively working to add detection routines for this exploit in order to  prevent such an infected website to affect the local computer.

Update, 13:50 GMT+1:

All Avira products detect  currently the known exploit files as HTML/Flashload.a and HTML/Flashload.b.

Please update your product manually in order to be protected.

Update, 19:00 GMT+1:

We have a generic detection built in the engine so that we are able to detect any file which makes use of the vulnerability. Please update to the engine 8.2.10.164. The malicious files are detected as HTML/Rce.Gen5.

 

Sorin Mustaca

Data Security Expert