BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Internet Explorer Remote Code Execution Vulnerability

Disclosed May 3, 2013    Fully Patched

Vulnerability Description:

A vulnerability in Internet Explorer 8 on Windows XP and Windows 7 has been observed to be exploited in the wild as part of a watering hole attack. Successful exploitation grants the attacker the ability to execute remote arbitrary code within the context of the current user.

Vendors:

Microsoft

Vulnerable Software/Devices:

Internet Explorer 8 on Windows XP and Windows 7

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible by convincing users to open a malicious web page. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 19041 - Microsoft Internet Explorer 8 Remote Code Execution Vulnerability (Zero-Day)
BeyondTrust's PowerBroker Endpoint Protection Platform protects against weaponized exploits targeting this vulnerability.

Mitigation:

Apply the Microsoft Fix It solution. Alternatively, if possible, upgrade to Internet Explorer 9 or 10; those versions are unaffected by this vulnerability. If using Internet Explorer 8, block/disable Active Scripting in both Internet and Local intranet zones. Alternatively use another browser, such as Chrome.

Links:

CVE(s):

None

Leave a Reply