Exploit code posted for new Internet Explorer flaw

Share this article:

An exploit taking advantage of an unpatched vulnerability in Internet Explorer (IE) has gone public.

Security researcher Shahin Ramezany said in a Tuesday tweet that he was able to exploit the flaw, which involves the way IE handles CSS style sheets on Windows 7 and Vista machines.

A video demonstrating code execution was posted Monday by Offensive Security, a provider of security tools and training.

On Wednesday, exploit code was published as part of the open-source Metasploit hacking toolkit.

The flaw is able to bypass two built-in Windows security features: Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR), according to Ramezany.

Microsoft has not yet confirmed the vulnerability.

"We're currently unaware of any attacks trying to use the claimed vulnerability or of customer impact," Dave Forstrom, director of trustworthy computing at Microsoft, told SCMagazineUS.com on Wednesday in an email. "Once we're done investigating, we will take appropriate action to help protect customers."



Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.