NY.gov Portal State Agency Listing
The following cyber advisory was issued by the New York State Office of Information Technology Services and is intended for State government entities. The information may or may not be applicable to the general public and, accordingly, the State does not warrant its use for any specific purposes.

ITS ADVISORY NUMBER:
2013-091

DATE(S) ISSUED:
9/18/2013

SUBJECT:
A vulnerability in Internet Explorer Could Allow Remote Code Execution (288705)

OVERVIEW:

A vulnerability has been discovered in Microsoft's web browser, Internet Explorer, which could result in remote code execution. If a user views a specially crafted website using Internet Explorer, an attacker could gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.

SYSTEMS AFFECTED:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11

RISK:
Government:

  • Large and medium government entities: High
  • Small government entities: High

Businesses:

  • Large and medium business entities: High
  • Small business entities: High

Home users: High
DESCRIPTION:
A vulnerability has been discovered in Microsoft's web browser, Internet Explorer, which could result in remote code execution.  The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.  Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

It should be noted that there is currently no patch available for this vulnerability and it is currently being exploited in the wild. Microsoft is reporting that there have been targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9.

Microsoft suggests to apply their Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround", that prevents exploitation of this issue. The link for the workaround is in the Recommendations section below.

RECOMMENDATIONS:
We recommend the following actions be taken:

  • Apply appropriate patches when provided by Microsoft to vulnerable systems immediately after appropriate testing.
  • If possible implement Microsoft's Fix It solution https://support.microsoft.com/kb/2887505
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.

REFERENCES:
Microsoft:

https://technet.microsoft.com/en-us/security/advisory/2887505
http://blogs.technet.com/b/msrc/archive/2013/09/17/microsoft-releases-security-advisory-2887505.aspx
https://support.microsoft.com/kb/2887505

Security Focus:
http://www.securityfocus.com/bid/62453

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893

Deborah A. Snyder

Acting Chief Information Security Officer


 

Cyber Security

GIS