Researchers confirm Googler’s Internet Explorer bug

French security researchers today confirmed the presence of a bug in Internet Explorer (IE) that’s at the center of a spat between Microsoft and a Google security engineer.

According to Vupen, IE8 harbors a vulnerability that can be exploited to hijack a Windows system.

“A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by remote attackers to take complete control of a vulnerable system,” said the French firm in anadvisory published Wednesday.

Vupen said it confirmed the vulnerability and its exploitability in IE8 running on Windows XP Service Pack 3 (SP3), but believed it could also be leveraged on Windows Vista, Windows 7, Server 2003, Server 2008 and Server 2008 R2.

The security company rated the bug as “critical,” its highest threat warning. In a follow-up tweet, Vupen said, “Reproducing was/is hard.”

The bug was publicly reported last Saturday by Michal Zalewski, a Google security engineer, when he released a new “fuzzing” tool that had found more than 100 bugs in the five major browsers: Chrome, Firefox, Internet Explorer (IE), Opera and Safari. He also published a crash dump of one of the IE bugs he believed could be exploited.

Zalewski’s release of “cross_fuzz” and the crash dump has sparked a skirmish between him and Microsoft.

The latter has claimed that even though its engineers have had the fuzzer since July, they were only able to identify the vulnerability Dec. 21, 2010, when Zalewski provided a newer version of the tool.

Zalewski has disputed that in a detailed timeline of the back-and-forth with Microsoft. Earlier this week he said he released cross_fuzz and the crash dump because Chinese hackers were already probing for information on the bug, and because Microsoft had not responded for months to his bug report.

Vupen identified the IE vulnerability as a “use-after-free error” within “mshtml.dll,” the code library that composes the browser engine. Attackers could exploit the bug by enticing people to a malicious Web page — a classic “drive-by” attack that compromises the browser as soon as it renders the page.

Microsoft has said it is investigating the IE vulnerability, but has not issued a security advisory or revealed its patching plans.

With the Vupen confirmation, Microsoft now has four unpatched bugs to work on, including acritical IE bug it acknowledged two weeks ago, a WMI Active X flaw in IE that went public at the same time, and a Windows vulnerability the company confirmed Tuesday.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now