New exploit targets Internet Explorer zero-day flaw

If you haven't upgraded to the latest version of Internet Explorer, you may soon be under attack.

clock face

An exploit has been published which targets an unpatched flaw in Internet Explorer (IE) 6 and 7.

Security firm Symantec tested the exploit and confirmed that it did work, though it was unreliable. However its analysis team said that they expected a fully-functional exploit to work in the near future.

If this exploit is used, attackers will be able to insert the exploit into websites. If an IE6 or IE7 user does browse one of these sites with Javascript enabled, they will be infected and their computer compromised.

The exploit targets a flaw in the way IE uses cascading style sheets (CSS), which is used to define the presentation of a website's content.

Symantec advised Internet Explorer users to ensure their antivirus was up to date, disable JavaScript and only visit websites they trusted until a fix was available.

IT PRO has contacted Microsoft for comment, but the company had not responded at the time of publication.

There have been no reports of any exploits in the wild, but IT PRO blogger Davey Winder said that this could all change as hackers look to rush out attacks before security vendors have updated signatures to find the exploit.

He said: "Microsoft, will, I imagine, be reactive rather than proactive with a patch only being prioritised after such attacks become widespread."

In August, Microsoft defended its ongoing use of Internet Explorer 6, which still has a quarter of web users, claiming that it was a matter of personal choice.

However, it did admit that as engineers, it wanted to see people upgrading to the latest versions.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021

Most Popular

University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021