Ramblings of an old Doc

 

A weekend blog post from MS about this. Not common at all.

This exploit would allow remote code execution if one visits an affected website, after browser compromise through email or even IM.

IE 10 and 11 are protected from this if they have “Enhanced Protection Mode” turned on. You are also protected if you have EMET 4.1 or 5.0 Tech Preview installed.

“Microsoft says that PC owners should always enable their personal firewall, make sure to have all of the latest software updates for their programs, and have all the most recent anti-virus and anti-malware definitions.

Finally, Microsoft said, " ... we encourage everyone to exercise caution when visiting websites and avoid clicking suspicious links, or opening email messages from unfamiliar senders." The blog did not have any information on when Microsoft will release a patch that will close this latest IE exploit.” – Neowin

 

Update 1:


MS has confirmed the security hole and workarounds - read more here:

http://www.neowin.net/news/microsoft-confirms-workarounds-for-internet-explorers-major-vulnerability


Source:

http://www.neowin.net/news/microsoft-issues-security-advisory-for-internet-explorer-exploit


Comments (Page 1)
4 Pages1 2 3  Last
on Apr 27, 2014

Thanks Seth.  

on Apr 27, 2014

e “Enhanced Protection Mode” turned on. Y

Screw 'em. I'm on XP/IE8

on Apr 27, 2014

Thanks Seth.  Will check, don't remember if its enhanced or not.  I don't browse with IE.... anyway. 

on Apr 27, 2014

The truth? I use Chrome...and I have EMET 4.1 - it's free from MS.

on Apr 27, 2014

I use Chrome and never IE cause its butfugly.

on Apr 28, 2014

Has it yet been or can it be determined what systems would the attacks most likely be against (Government, Industry, Home Users)?  I want to apply the appropriate actions to prevent an attack on my system but I don't want to take unnecessary steps.  I have anti-virus and malware programs, each morning I check for updates.  I run full scans once a week and make backups, I also do quick scans every evening before turning off the computer. 

I have turned on Enhanced Protection Mode.

Would I be incorrect in expecting that sites such as Stardock/WinCustomize have all ready taken necessary and appropriate actions?

on Apr 28, 2014

Philly:

The primary infection comes through email. Then the remote executing code comes in when infected websites are browsed.

It will act on ANY computer, and the damage done depends where the computer is/used for.

Homeland Security, IT experts and yours truly say: Do what you can to fix IE but SWITCH BROWSERS until MS patches IE,.

on Apr 28, 2014

Thanks seth, the dialog box was very counter intuitive.   

on Apr 28, 2014

 

Running your computer system(s) from a 'least privilege' perspective (not using the 'admin' account and using the local security policy to lock down privileges further) is and always will be the single most important defensive tactic one can employ to combat malicious code execution (remote or otherwise).  Do yourselves a favour and reserve the 'admin' account for related 'admin duties' and browse/use the computer using a regular (limited privilege) account.  Honestly, every other type of 'precaution' one can think of (switching browsers, adding more security software, performing more scans etc. etc. etc.) combined don't amount to the level of overall system protection one garners through simply running one's PC with 'least privilege'.

 Of course applying any/all related security patches as they become available is always advisable.  No need to leave the barn door open....

@ Doc, as always.......thanks for the info! 

on Apr 28, 2014

SF Chronicle story: The company is working on a fix which it plans to provide in a software update on May 13.

I didn't see anything about IM concerns. I wouldn't know since I don't IM anyone but curious now; is the IM application browser dependent.

on Apr 28, 2014

@ the_Monk: You're not getting away with your cleverly disguised attempt to not prepare the article I want from you.

If you just do a paragraph or two per day, you'll finish with no strain, you know...

And I do agree that the best line of defense is the local and group security policies...so...we all continue to await your tutorial.

 

You're certainly welcome, the_Monk.



@ gmc2:


SF Chronicle story: The company is working on a fix which it plans to provide in a software update on May 13.

I didn't see anything about IM concerns. I wouldn't know since I don't IM anyone but curious now; is the IM application browser dependent.

IM concerns are the same as those for email, namely passing infected files which then compromise the browser (IE) and then, when the browser comes to an infected site, the remote access malware compromises the computer.

on Apr 28, 2014
on Apr 28, 2014

thanks for the clarification Doc.

4 Pages1 2 3  Last