Newest IE bug could be next Conficker

Critical IE bug is 'custom-made' for hackers, claims security expert; expect major attacks

The critical bug that Microsoft confirmed Monday but has yet to patch is a prime candidate for another Conficker-scale attack, a security researcher said.

"It's better than [the vulnerability used by] Conficker," Roger Thompson, chief research officer at AVG Technologies, said yesterday. "It exposes the whole world, and can be exploited through the firewall. That's better than Conficker, which mostly did its damage once it got inside a network."

[ Some experts believe the number of PCs infected by Conficker could be in the tens of millions. | For the full Test Center rundown on browser security, see InfoWorld's special report. | Learn how to secure your systems with Security Adviser newsletter. ]

Conficker, the worm that exploded into prominence last January when it infected millions of machines, exploited an already-patched bug in Windows that Microsoft had thought dire enough to fix outside its usual update schedule.

The worm hijacked a large number of PCs -- estimates ranged as high as 12 million at one point -- and then assembled them into a massive botnet able to spread malware, plant fake anti-virus software, or distribute huge amounts of spam.

"I have no doubt that the really bad guys are bustling to get this [new vulnerability] into their exploit toolkits," said Thompson. "For the Conficker people, this could be the next thing. They waited until they had a really good exploit, then combined that with some smart strategies. So I wouldn't be surprised if they picked up on this."

The vulnerability Thompson's worried about is in the Microsoft Video Controller ActiveX Library, or the msvidctl.dll file, an ActiveX control that can be accessed using Internet Explorer (IE). Although the bug has been used by hackers since at least June 9, it only made it into the public eye this week, when several security companies, including firms in both China and Denmark, reported that thousands of compromised sites were serving up exploits.

On Monday, Microsoft acknowledged the vulnerability in a security advisory, said it would produce a patch, and provided an automated tool to disable the ActiveX control by setting nearly three-dozen "kill bits" in the Windows registry.

"This is a good exploit with a big lump of infectable people," said Thompson.

One reason why the bug is an excellent choice for hackers is that it hasn't been patched. When Conficker first appeared, the flaw it exploited had already been patched by Microsoft. It turned out, however, that there were plenty of PCs that had not been updated with the fix.

Thompson wouldn't hazard a guess as to whether Microsoft would be able to craft a fix in time to add it to the patches slated for delivery next Tuesday, July's regularly scheduled update day. "But I'm fairly confident that they're trying very hard," he said.

Attack code is readily available, Thompson said, meaning that attackers not yet abusing the bug don't have to figure out an exploit of their own. "If the people who infect banner ads use this before there's a patch, then watch out," he warned.

Today, Microsoft admitted that researchers at IBM's ISS X-Force had reported the vulnerability in 2008, but did not name the date. The X-Force researchers had uncovered the flaw in late 2007 and had reserved a CVE (Common Vulnerabilities and Exposures) number in December of that year. One of the researchers, Alex Wheeler, who is now the manager of 3Com's TippingPoint DVLabs, declined to name the date ISS reported the bug to Microsoft, citing a nondisclosure agreement he'd signed with his former employee.

Microsoft didn't directly answer a question about why it had not patched the ActiveX vulnerability when it has known about the bug for at least six months and possibly as many as 18. "When we were alerted in 2008, we immediately started an investigation," a company spokesman said today in an e-mail. "As we wanted to be thorough, this took extra time to fully evaluate."

The "extra time" Microsoft needed may strike some as odd, since the ActiveX control -- the msvidctl.dll file -- is the company's own code. And that's unusual, said Thompson. "This is the first issue with a Microsoft .dll for, really, a long while," Thompson said. "Maybe since the ANI bug in April 2007. Usually, it's a Chinese .dll or something from Adobe."

The vulnerability in Windows' animated cursor -- found in the user32.dll file -- was patched more than 100 days after Microsoft was alerted by Alexander Sotirov, a vulnerability researcher at Determina. Microsoft issued an out-of-band patch for the ANI bug, breaking from its regular monthly schedule.

"It's not the end of the world or anything," said Thompson. "But I won't be surprised to see Version 2.0 of Conficker with this. It seems custom-made for them."

Systems running Windows XP or Windows Server 2003 are vulnerable to current attacks through IE6 and IE7. Windows Vista and Windows 7 are not at risk; nor are users running IE8 or other browsers, such as Mozilla's Firefox and Google's Chrome.

This story, "Newest IE bug could be next Conficker" was originally published by Computerworld.

From CIO: 8 Free Online Courses to Grow Your Tech Skills
Join the discussion
Be the first to comment on this article. Our Commenting Policies