Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Security

New IE 8 Zero Day Discovered 134

Trailrunner7 (1100399) writes "Researchers have disclosed a new zero day vulnerability in Internet Explorer 8 that could enable an attacker to run arbitrary code on vulnerable machines via drive-by downloads or malicious attachments in email messages. The vulnerability was discovered and disclosed to Microsoft in October, but the company has yet to produce a patch, so HP's Zero Day Initiative, which is handling the bug, published its advisory Wednesday. The ZDI has a policy of disclosing vulnerability details after 180 days if the vendor hasn't produced a patch. The use-after-free flaw lies in the way that IE handles CMarkup objects, and ZDI's advisory says that an attacker can take advantage of it to run arbitrary code."
This discussion has been archived. No new comments can be posted.

New IE 8 Zero Day Discovered

Comments Filter:
  • by Anonymous Coward on Wednesday May 21, 2014 @08:12PM (#47061969)

    You forgot to add to your timeline:

    4/08/2014 - Windows XP (stuck on IE 8) goes out of official support

    Ironically, one day before the disclosure was supposed to happen, how convenient for Microsoft.

  • by BBCWatcher ( 900486 ) on Wednesday May 21, 2014 @08:35PM (#47062121)

    Internet Explorer 8 was the last Internet Explorer available for Windows XP. Was Microsoft tempted to ignore the security exposure until XP fell out of support? Are there other security vulnerabilities in Windows XP reported before April, 2014, that Microsoft has ignored? Will Microsoft ignore (or at least slow walk) reported security vulnerabilities in their other products as they get nearer (but not actually reach) their end of support dates?

    These continuing security defects are really beyond ridiculous. Maybe regulators -- the European Commission? -- ought to be mandating that vendors fix security vulnerabilities in their products within, say, 120 days. That would extend to all products sold (refurbished, new, whatever) within the past, say, 7 years. Otherwise, the vendor will be automatically barred from selling anything unless and until their security messes are cleaned up.

  • Re:IE EIGHT? (Score:5, Interesting)

    by xlsior ( 524145 ) on Wednesday May 21, 2014 @08:57PM (#47062239) Homepage
    Unfortunately, IE 8 is the last version of Internet Explorer that's compatible with Windows XP.... Meaning there are hundreds of millions of computers out there that are vulnerable to this exploit, which can't 'just' upgrade to a newer IE version without paying a hundred bucks to upgrade their entire OS first. Annoyingly, this bug was reported to MS when XP still had 6-7 months of extended support for XP left on their count-down clock. Today, XP is no longer supported and unless this bug starts getting heavily exploited in the wild a fix will probably never come.
  • Re:IE EIGHT? (Score:2, Interesting)

    by Anonymous Coward on Wednesday May 21, 2014 @10:00PM (#47062551)

    Right. And the other $500 for the other puter'. oh, and the $300 for the app upgrades. Oh, and the $100 for a printer that has drivers. Or, M$oft, you could just patch what's broke for the common good. Eventually all good chipsets come to an end, and they move off. But until then...

  • by Dega704 ( 1454673 ) on Wednesday May 21, 2014 @10:22PM (#47062625)
    Honestly, I hope they do not release a patch so that all of the sysadmins they turned into liars with the last one can get some of their credibility back.
  • by gl4ss ( 559668 ) on Thursday May 22, 2014 @05:09AM (#47063967) Homepage Journal

    third of the fifth? or fifth day of the third?

    month-day-year is just madness. for various reasons. if you don't get the reasons then you're just knee(1 foot) deep in madness already.

    even year-month-day makes more sense and overall readability is best with day-month-year. one tanker, 100 barrels and 10 cups. makes no sense to go 100 barrels, 10 cups and one tanker.

  • "Zero-Day exploit allowing the attacker to run arbitrary code"

    I thought these words should be history based on the implemented NX bit, sandboxing, multiple lines of defense and Data Execution Prevention [wikipedia.org] features of MS Windows after XP.

    Why do all these features fail, when they are specifically designed for exposed code like IE? Or does this warning assume the worst case, where all these other features are turned off?

This file will self-destruct in five minutes.

Working...