Attackers are actively exploiting one of the 11 Internet Explorer vulnerabilities patched by Microsoft last week.
Symantec has identified an in-the-wild exploit targeting the Timed Interactive Multimedia Extensions memory corruption flaw that was fixed as part of a cumulative patch for IE.
While the vulnerability impacts versions 6, 7 and 8 of the web browser, researchers at Symantec have only witnessed an exploit that affects users running version 8.
Attacks appear to be happening on a fairly limited and targeted basis, Joji Hamada, a senior security researcher, said in a blog post. Symantec has confirmed at least one attack in which the website of a restaurant was compromised to deliver the exploit, dubbed Trojan.Shixploit, via a hidden IFRAME.
The vulnerability involves the way that IE "accesses an object that has not been correctly initialised or has been deleted" and may allow for the execution of arbitrary code, according to Microsoft.
This article originally appeared at scmagazineus.com
Copyright © SC Magazine, US edition
Issue: 316 | July 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.