Threat of the month: MS zero-day

Threat of the month: pdf.exe.zip files
Threat of the month: pdf.exe.zip files

What is it?

A zero-day vulnerability in Microsoft XML Core Services, which is included with various Microsoft products to provide W3C compliant APIs for parsing of XML content.

How does it work?

The vulnerability is caused by an error in the “DOMNode::get_definition” function when the “definition” method is called for a DOM object, causing the value of a VARIANTARG to be left uninitialized. Later, this value is dereferenced as an object pointer, which allows gaining control of the program flow since it is possible to cause the stack space storing the uninitialized VARIANTARG value to contain attacker-controlled data.

Should I be worried?

The vulnerability is being actively exploited via Internet Explorer.

How can I prevent it?

Microsoft released patches for this flaw in mid-July. Previous to the release, Microsoft issued a security advisory, KB2719615, with a Fix it solution that can be used as a workaround to block the attack vector.

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.