Microsoft issues Security Advisory for Internet Explorer
Microsoft Security Advisory (2887505)
Vulnerability in Internet Explorer Could Allow Remote Code Execution
Microsoft is investigating public reports of a vulnerability in all supported versions of Internet Explorer. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9. Applying the Microsoft Fix it solution, “CVE-2013-3893 MSHTML Shim Workaround,” prevents the exploitation of this issue. See the Suggested Actions section of this advisory for more information.
The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.
On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers. In addition, we are actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.
Microsoft continues to encourage customers to follow the guidance in the Microsoft Safety & Security Center of enabling a firewall, applying all software updates, and installing antimalware software.
By default, Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 runs in a restricted mode that is known as Enhanced Security Configuration. This mode mitigates this vulnerability.
By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted sites zone. The Restricted sites zone, which disables script and ActiveX controls, helps reduce the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an email message, the user could still be vulnerable to exploitation of this vulnerability through the web-based attack scenario.
An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker’s website.
For more information about this issue, see the following references:
For 6 years now, we’ve relied on ANC to support our network; when we purchased another existing practice, ANC managed our move from coordinating with vendors, ordering hardware, and making sure our network was fully operational.
Dana RyanMision Viejo Audiology
ANC came in and prepared a project plan to transition Anaheim Hearing Center to the new systems, working with TIMS to ensure a smooth switch over. ANC took care of the entire process for us.
Julie BallAudiologist - Anaheim Hearing
We have upgraded HSA’s entire network and domain for every phase in HSA’s growth and office expansions. This includes replacing a 100+ user Exchange server and virtualizing physical servers into Hyper-V servers.
Manuel MaizteguiHuman Services Association
I recently moved my dental office and purchased 7 computers and a server. He had them networked together quickly and with a smile. I appreciate the fact that he makes himself available to answer my questions by e-mail or over the phone.
we have found that we could always count on Advanced Network Consulting to keep things running well, understand what we need and get the job done. I have referred Advanced Network Consulting to other Dental Offices, and I would do so again.
We have a fairly complex office with at least 18 computers, a server, 4 TVs connected to surround sound systems, and other technical devices and ANC makes it all work. Their techs are personable and a pleasure to work with.
Sunni McbrideSouthBay Hearing
ANC designed our network, desktop and office space layout, keeping our future growth and expansion in mind. They were mindful of our budget and provided guidance in the choice of technology.
Janell ReidTustin Hearing Center
He then put together a long-term plan and provided extraordinary support during the implementation. Chris’ personality “clicked” with the entire team, which allowed him to solve a wide variety of issues. He is thorough, knowledgeable, very timely and highly ethical.
Phyllis AbramsPG Drives
They helped us by managing an upgrade of our EZDental program. Since then they have installed a server and centralized all of our data and setup a backup program. Our office computer systems have been running smoothly since we switched to ANC.
Douglas DanielsDaniels Dental Care
Whether it’s been a wireless issue or a complete installation of the new cabling of our new building, they have been our “go to” IT support company every step of the way. Their response time to solve a problem has always been quick and thorough.
Jack CrawleyFisk Auto
He and his team have worked with us through several transition and growth phases, including the opening of a second office. We rely and trust ANC to manage and secure our network and continue to enjoy our relationship with them.
ANC has become an instrumental resource for our company. Advanced Network Consulting always designs the project plans not only for the task at hand, but keeping an eye on the big picture and how a specific project impacts the overall network long term goals.