This vulnerability is being exploited in IE versions 6-8 and on all Windows Operating Systems.
Please follow the recommended procedures.
We recommend the following actions be taken:
Consider applying appropriate workarounds recommended by Microsoft to vulnerable systems immediately after appropriate testing:
· Set Internet and Local intranet security zone settings to “High” to prompt before running ActiveX Controls and Active Scripting in these zones
· Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
· Enable DEP for Internet Explorer 6 Service Pack 2 or Internet Explorer 7
Consider using an alternate web browser until a patch is available.
Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
Ensure that all anti-virus software is up to date with the latest signatures.
Inform and educate users regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
If you believe you have been affected by attacks exploiting this vulnerability, please contact us immediately.
Current details available from – http://secunia.com/advisories/38209/
A vulnerability has been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user’s system.
The vulnerability is caused due to an unspecified error and can be exploited to trigger the use of a freed object via a specially crafted web page.
Successful exploitation allows execution of arbitrary code.
NOTE: This vulnerability is currently being actively exploited.
Do not browse untrusted websites or follow untrusted links.
Provided and/or discovered by:
Reported as a 0-day.
A URL has been provided that can be used to check the integrity of a suspect file. It is available at http://wepawet.cs.ucsb.edu/index.php