Java zero-day leads to Internet Explorer zero-day

While looking around a compromised server that was being used to exploit Java vulnerabilities, a security researcher stumbled upon another exploit that he claims affects fully patched versions of Microsoft Internet Explorer 7 and 8.

Eric Romang found four files on the server: an executable, a Flash Player movie and two HTML files called exploit.html and protect.html

When users visit the exploit.html page, it loads the Flash movie, which in turn loads the other HTML page, protect.html. Together, they help drop the executable on to the victim’s computer. At this point, attackers have everything they need to drop whatever applications they like on the victim’s machine, whether it is to join a botnet or conduct attacks. In this case, the dropper executable installs another program when the victim next logs in.

Romang discussed the zero-day with other security researchers, who also came to the same conclusion that this was a vulnerability in Internet Explorer.

However, Romang’s presence has not gone unnoticed by those behind the exploit. Shortly after Romang discovered the zero-day, the exploit authors removed the files from the server, replacing them with a text file containing Romang’s Twitter handle, “eromang”. They also removed the previous Java exploit that was on the server.

The vulnerability has also been picked up by developers working on the Metasploit exploit framework, and an early version of a module exploiting the zero-day has already been created.

Views: 0

You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes