Microsoft has released a security bulletin and software updates to address the Microsoft Internet Explorer Watering Hole attack.
Reports indicate that malicious websites are exploiting multiple vulnerabilities in Microsoft Internet Explorer versions 7, 8, 9, and 10. The vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on a vulnerable system.
Malicious software on attacker-controlled websites leverages an information disclosure vulnerability in Microsoft Internet Explorer to obtain the timestamp from the PE headers of msvcrt.dll. The malicious software uses the timestamp value to create additional exploits against the identified system, ensuring better success with additional exploits.
The malicious site then attempts to exploit an additional vulnerability in Internet Explorer that exists because of improper memory operations. The malicious site attempts to exploit this vulnerability and install malicious software on the affected system. The malicious software has been identified as a variant of the Hydraq/McRAT malicious software family as reported by Fireeye.
Microsoft has confirmed the vulnerability and software updates are available.
Microsoft has released security bulletin MS13-090 and assigned CVE-2013-3918, as documented in IntelliShield Alert 31635, to this issue.
Microsoft customers can obtain updates directly by using the links in the security bulletin. These updates are also distributed by Windows automatic update features and available on the Microsoft Update service. Microsoft Windows Server Update Services (WSUS), Systems Management Server, and System Center Configuration Manager can assist administrators in deploying software updates.
Users should verify that unsolicited links are safe to follow.
Version 1, November 11, 2013, 9:16 PM: Reports indicate attackers are using an unpatched vulnerability in Microsoft Internet Explorer that could allow an unauthenticated, remote attacker to gain sensitive information and execute arbitrary code on an affected system.
The security vulnerability applies to the following combinations of products.
7.0 Base | 8.0 Base | 9.0 Base | 10.0 Base
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.