Severity 10 Security Alert: Exploit Published for Microsoft Internet Explorer 'createTextRange' Remote Execution Vulnerability

Share Article

Leading security and compliance expert secure elements available to comment on threat.

An exploit has been published for a vulnerability found in Microsoft Internet Explorer which could be used by attackers to run arbitrary code on target systems. The flaw is due to an error when processing a "createTextRange()" call related with control objects (radio, checkbox).

"The irresponsibility of releasing such a dangerous exploit will require systems administrators to take drastic action to protect their systems. When vulnerable home systems are added into the equation, Internet explorer users can expect a virus or worm in the very near future,” said Scott Carpenter, director of security labs at Secure Elements. “The most probable vector for this worm will be in the form of SPAM with malicious links that will tempt users into clicking on a link that takes them to a malicious web site. While security researchers attempted to not disclose the actual exploit code for the vulnerability, an exploit has already been published on multiple Internet sites that can be used by anyone with even a small amount of computer skills to create seriously damaging virus or worm.”

Engineers within the Secure Elements’ Security Labs, the leader in enterprise vulnerability management and compliance risk reduction solutions, have classified the severity of this vulnerability as “10,” meaning the vulnerability is remotely exploitable and the exploit has been released. The Secure Elements Security Lab engineers are not aware of any official patches released by Microsoft for this vulnerability. As a workaround, Secure Elements recommends disabling Active Scripting in Internet Explorer.

Subscribers to the C5 Alert service have been advised on the mitigation measures, and those who use the C5 EVM suite are recommended to deploy remediation SE-0005218 (which disables Active Scripting in Internet Explorer) immediately due to the imminent threat represented by this zero day exploit.

Systems Impacted:

--Microsoft Internet Explorer 6.x

References:

    --http://rm.secure-elements.com/rss/docs/20060323_alert6.html
--http://secunia.com/advisories/18680/
--http://www.frsirt.com/english/advisories/2006/1050
--http://blogs.technet.com/msrc/archive/2006/03/22/422849.aspx
--http://www.computerterrorism.com/research/ct22-03-2006
--http://www.milw0rm.com/exploits/1606

Secure Elements Security Labs Director, Scott Carpenter is available to discuss the vulnerability, what it means to consumers and businesses, and the reaction to the exploit by members of the vulnerability management community.

Enterprises or others may contact Secure Elements at 1-800-709-5011 to obtain more information or schedule discussions with expert sources from Secure Elements.

Members of the media interested in obtaining commentary from Mr. Carpenter of Secure Elements should contact: Stephanie Stadler; Telephone: +1 703-287-7819.

About Secure Elements

Secure Elements, a leader in enterprise vulnerability management and compliance risk reduction solutions, automates security remediation strategies and tactics across the entire enterprise, reducing business risk and IT management costs while improving systems performance and maintaining business continuity. The company rapidly identifies and intelligently responds to complex and diverse security incidents, protecting mission critical and network infrastructure assets from both known and unknown attacks without limiting operational performance. Using real-time threat intelligence data and analysis, Secure Elements provides administrators with optimal security control and visibility across the enterprise. Based in Northern Virginia, Secure Elements serves organizations in the federal government and critical infrastructure markets, as well the Global 1000. For more information, please visit http://www.secure-elements.com.

Contact:

Stephanie Stadler

On behalf of Secure Elements

703.287.7819

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Stephanie Stadler
Visit website