Microsoft confirms Internet Explorer flaw being used in "targeted" attacks

The vulnerability affects IE 6 to 11 and can be used to make limited, targeted attacks

Internet Explorer logo

Microsoft has confirmed the existence of a vulnerability in versions 6 through to 11 of its Internet Explorer browser.

The vulnerability has been used to carry out "limited, targeted attacks", the software giant confirmed, and could allow remote code execution.

Microsoft said in a blog post the vulnerability allows Internet Explorer to access an object in memory that has been deleted or improperly allocated.

Advertisement - Article continues below

"The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website," it said.

However, the vulnerability is not as severe in IE on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 because they run IE in Enhanced Security Configuration.

The threat is also reduced when an HTML email is opened in Microsoft Outlook, Microsoft Outlook Express or  Windows Mail because they too use the restricted environment.

If a hacker was able to take over the rights of a user account, they will only be able to carry out any additional tasks the user is allowed to do. Therefore, if the user has restricted administrator rights, the hacker would not be able to do as much damage as those with full access.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Microsoft said it is working with its partners to find a solution that may be rolled out via its monthly security update release process, or as an out-of-cycle security update, depending on the severity of the situation.

In January, Microsoft issued an out-of-cycle security fix to versions 6, 7 and 8 of Internet Explorer after a similar vulnerability was discovered.

Featured Resources

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Remote working 2020: Advantages and challenges

Discover how to overcome remote working challenges

Download now

Keep your data available with snapshot technology

Synology’s solution to your data protection problem

Download now

After the lockdown - reinventing the way your business works

Your guide to ensuring business continuity, no matter the crisis

Download now
Advertisement

Recommended

Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
University of California gets fleeced by hackers for $1.14 million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Australia announces $1.35 billion investment in cyber security
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
CSA and ISSA form cyber security partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
How do you build a great customer experience?
Sponsored

How do you build a great customer experience?

20 Jul 2020