Symantec Corp. is warning of a new publicly available exploit code targeting an unpatched display vulnerability...
in Internet Explorer (IE) that could enable hackers to conduct drive-by attacks and spread malware on unsuspecting victim machines.
"The exploit currently exhibits signs of poor reliability, but we expect that a fully functional a reliable exploit will be available in the near future," Symantec said in a blog posting on Saturday. "For an attacker to launch a successful attack, they must lure victims to their malicious webpage or a website they have compromised."
Cupertino, Calif.-based Symantec said the IE zero-day exploit code appeared Friday on the Bugtraq mailing list. Symantec and several other security vendors are providing antivirus and IPS signatures to protect against the attack.
IT security research and alert vendor VUPEN Security also reported the vulnerability on Saturday, saying the flaw is a dangling pointer in the Microsoft HTML Viewer (mshtml.dll).
Danish vulnerability clearinghouse Secunia gave the IE zero-day flaw a highly critical rating in an alert issued today. Secunia confirmed the vulnerability in IE6 on Windows XP SP2 and IE7 on Windows XP SP3A.
Microsoft acknowledged the IE zero-day exploit code in a security advisory issued late Monday. In a statement, Alan Wallace of Microsoft security response communications said Microsoft was not aware of any ongoing attacks to exploit the reported vulnerability.
"The company is aware of public, detailed exploit code that allows an attacker to gain the same rights as a local user; however, the exploit code requires an attacker to convince users to visit a maliciously-crafted website," Wallace said. "Microsoft is recommending that customers with earlier versions of the browser consider downloading the more recent version of IE to take advantage of the latest security and privacy features.
As a workaround Microsoft recommends companies set Internet and local intranet security zone settings to "high" or customize the security setting to force the browser to prompt users before it runs an active script. Data Execution Protection (DEP) can also be enabled in IE 7 to make the attack much more difficult to carry out.
The software giant patched a serious Windows kernel flaw earlier this month, fixing a vulnerability that enabled attackers to set up a malicious website and target users of Internet Explorer using embedded OpenType font.
Editor's Note: This story was updated Nov. 24 to add Microsoft advisory information