Sunday, July 12, 01:37
Home security Zero-day vulnerability in Internet Explorer - No patch yet

Zero-day vulnerability in Internet Explorer - No patch yet

Zero-dayA few days ago, h Microsoft announced the existence of one zero-day vulnerability found in Internet Explorer (IE) and is already in use hackers.

So far, the company has given some tips risk mitigation, but no one has been released patch for the correction of vulnerability and protection of systems.

However, he said that experts have already started working on the issue security.

While Microsoft said it knew about zero day vulnerability in Internet Explorer and about its exploitation by hackers, he said they have become few attacks, indicating that vulnerability is not used to target many victims, but is part of attacks that target a small number of users.

Experts believe that vulnerability is used within a wider context hacking campaign, which aims and users of Firefox.

Connect to zero-day vulnerability in Firefox, fixed last week

Last week, the Mozilla fixed a similar zero-day vulnerability, which was also used by hackers to attack Firefox users. The vulnerability was discovered by her Qihoo 360, which updated Mozilla.

The researchers of Qihoo 360, had written in a tweet (which does not exist now) that the attackers were exploiting another zero-day vulnerability (beyond that in Firefox), which targeted Internet Explorer users. Obviously, they were referring to this particular day zero vulnerability, announced by Microsoft.

There is no information yet on the attacker or the nature of the attacks.

RCE vulnerability at Internet Explorer

Microsoft said the vulnerability allows it remote code execution (RCE) and caused by a memory error in scripting engine of Internet Explorer, which handles the code JavaScript.

How did the Microsoft vulnerability?

The vulnerability lies in the way the scripting engine handles things in memory in Internet Explorer. This problem could allow an attacker to execute code. The attacker who successfully exploits vulnerability may acquire the same user rights as the victim user. If the user is logged on with user administrator rights, the attacker will be able to get the user control of an entire system. This means that they will be able to do anything (eg install programs, edit or delete data, create accounts, etc.).

According to Microsoft, all versions of Windows desktop and Server OS are vulnerable.

This zero-day RCE vulnerability is also known as CVE-2020-0674.

Internet Explorer is not the default browser in the latest versions of Windows OS, but it is still used. Users with earlier versions of Windows are at greater risk.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


COVID-19-workplace: What can you do to avoid becoming a source of infection?

The number of COVID-19 cases worldwide seems to be increasing. However, most countries have ...

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...