by CIO Staff

Critical IE Bug Gets Early Fix from Microsoft

Sep 27, 20063 mins
IT Strategy

With attackers finding new ways to exploit a critical flaw in Internet Explorer, Microsoft has released a patch for the problem, ahead of its next scheduled round of security updates.

The patch fixes a critical vulnerability in the way Internet Explorer renders VML (Vector Markup Language) graphics. Hackers had been exploiting the flaw, which also affects some versions of Outlook, for more than a week, and in recent days malicious activity had been on the upswing. More information on the update, which was released Tuesday, can be found here.

The out-of-cycle release is unusual, but not unprecedented.

Microsoft generally releases its security updates on the second Tuesday of every month, giving system administrators a predictable way to set aside time to test the new software. Occasionally, the company will release patches ahead of time if a flaw is being widely exploited by attackers. In January it patched a critical flaw in the Microsoft Windows Metafile (WMF) image-rendering engine after it became a widespread problem.

With attack code that works on the latest version of Windows XP now publicly available, the VML bug is shaping up as a very serious concern for administrators, said Ken Dunham, the director of Verisign’s iDefense Rapid Response Team. VML attacks have now “dwarfed the WMF activity in the same period of time compared to last year,” he said.

By Tuesday, more than 3,000 Web sites were already infecting users with malware that exploited the VML bug, according to Dunham. One week into the WMF outbreak last January, iDefense saw about 600 sites exploiting the problem.

Security experts also warn that there are many variants of the VML malware, some of which may be missed by security software. Researchers at iDefense are now looking at a dozen possible variations of the VML exploit code and have confirmed the existence of seven variants, Dunham said. “With WMF there wasn’t nearly as much modification. We see a lot of different permutations and obfuscation techniques being utilize with VML attacks.”

A group of security researchers released a patch for the VML flaw late last week, independent of Microsoft.

But criminals have even found a way to make patching seem dangerous.

In the past few days they have been circulating phoney e-mails, claiming to be a patch for the VML problem. If downloaded, this fake patch actually installs malicious software on the victim’s system, Dunham said.

Microsoft’s next regularly scheduled security updates will be released Oct. 10.

-Robert McMillan, IDG News Service (San Francisco Bureau)

Related Links:

  • Microsoft Facing Pressure to Patch IE Flaw

  • ZERT Patches IE Zeroday Flaw Before Microsoft

This article is posted on our Microsoft Informer page.  For more news on the Redmond, Wash.-based powerhouse, keep checking in.

Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.