Threat of the month: MS zero-day

IE exploits are the "Threat of the Month"
IE exploits are the "Threat of the Month"

What is it?

A zero-day vulnerability in Microsoft XML Core Services, which is included with various Microsoft products to provide W3C compliant APIs for parsing of XML content.

How does it work?

The vulnerability is caused by an error in the “DOMNode::get_definition” function when the “definition” method is called for a DOM object, causing the value of a VARIANTARG to be left uninitialized. Later, this value is dereferenced as an object pointer, which allows gaining control of the program flow since it is possible to cause the stack space storing the uninitialized VARIANTARG value to contain attacker-controlled data.

Should I be worried?

The vulnerability is being actively exploited via Internet Explorer.

How can I prevent it?

Microsoft released patches for this flaw in mid-July. Previous to the release, Microsoft issued a security advisory, KB2719615, with a Fix it solution that can be used as a workaround to block the attack vector.

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.