Microsoft warns of Internet Explorer security flaw
Microsoft has issued a warning about a potential bug in Internet Explorer that could leave it vulnerable to hackers.
The company has urged customers to download a piece of security software to mitigate the risk of infection.
The security flaw affects hundreds of millions of Internet Explorer browser users. Microsoft said attackers can exploit the bug to infect the PC of somebody who visits a malicious website and then take control of the victim’s computer.
The software maker advised customers on its website late on Monday to install the security software as an interim measure, buying it time to fix the bug and release a new, more secure version of Internet Explorer. The company did not say how long that will take, but several security researchers said they expect the update within a week.
The free security tool, which is known as the Enhanced Mitigation Experience Toolkit, or EMET, is available through an advisory on Microsoft’s website.
The EMET software must be downloaded, installed and then manually configured to protect computers from the newly discovered threat, according to the posting from Microsoft. The company also advised customers to adjust several Windows security settings to thwart potential attackers, but cautioned that doing so might impact the PC’s usability.
Some security experts said it would be too cumbersome for many PC users to implement the measures suggested by Microsoft.
Instead they advised Windows users to temporarily switch from Internet Explorer to rival browsers such as Google Inc’s Chrome, Mozilla’s Firefox or Opera Software ASA’s Opera
“For consumers it might be easier to simply click on Chrome,” said Dave Marcus, director of advanced research and threat intelligence with Intel Corp’s McAfee security division.
Marc Maiffret, chief technology officer of the security firm BeyondTrust, said it may not be feasible for some businesses to install Microsoft’s EMET tool on their PCs.
He said the security software has in some cases proven to be incompatible with existing programs already running on networks.
Tod Beardsley, an engineering manager with the security firm Rapid7, said that at first blush it appeared that the EMET may not be particularly effective in thwarting potential attacks.
Microsoft officials declined to comment on the skepticism that those security experts expressed about the effectiveness of the EMET software.
Eric Romang, a researcher in Luxembourg, discovered the flaw in Internet Explorer on Friday, when his PC was infected by a piece of malicious software known as Poison Ivy that hackers use to steal data or take remote control of PCs.
When he analyzed the infection, he learned that Poison Ivy had gotten on to his system by exploiting a previously unknown bug, or “zero-day” vulnerability, in Internet Explorer.
“Any time you see a zero-day like this, it is concerning,” said Liam O Murchu, a research manager with anti-virus software maker Symantec Corp. “There are no patches available.
It is very difficult for people to protect themselves.”
Zero-day vulnerabilities are rare, mostly because they are hard to identify — requiring highly skilled software engineers or hackers with lots of time to scrutinize code for holes that can be exploited to launch attacks. Security experts only disclosed discovery of eight major zero-day vulnerabilities in all of 2011, according to Symantec.
Symantec and other major anti-virus software makers have already updated their products to protect customers against the newly discovered bug in Internet Explorer. Yet, O Murchu said that may not be sufficient to ward off adversaries.
“The danger with these types of attacks is that they will mutate and the attackers will find a way to evade the defenses we have in place,” he said.
Internet Explorer was the world’s second-most widely used browser last month, with about 33% market share, according to StatCounter. It was close behind Chrome, which had 34% of the market.