Menu
Unpatched Microsoft XML Core Services flaw increasingly targeted in attacks, researchers say

Unpatched Microsoft XML Core Services flaw increasingly targeted in attacks, researchers say

Sophos discovers new compromised websites that exploit the CVE-2012-1889 MSXML vulnerability

An unpatched vulnerability in the Microsoft XML Core Services (MSXML) is being exploited in attacks launched from compromised websites to infect computers with malware, according to security researchers from antivirus vendor Sophos.

One such attack was spotted Wednesday on the website of a European aeronautical parts supplier that had been hacked, Sophos senior technology consultant Graham Cluley said in a blog post. It follows a similar attack detected over the weekend on the compromised website of an European medical company, he said.

Both compromised websites had rogue code injected into them that loaded an exploit for the CVE-2012-1889 MSXML vulnerability when accessed in Internet Explorer.

"A hacker who manages to plant malicious code on the website of, say, a company which supplies aeronautical parts may reasonably predict that staff at a larger organisation - such as an arms manufacturer or defence ministry - might have reason to access the site," Cluley said.

The MSXML vulnerability is believed to have been exploited in state-sponsored attacks against Gmail users earlier this month. Microsoft issued a security advisory about the flaw on June 12 and advised customers to apply one of several proposed work-arounds until a final security patch is released.

Exploit code that works on all versions of Internet Explorer on Windows XP, Vista and 7 has been added to the Metasploit penetration testing framework. "We expect this vulnerability to grow even more dangerous since there's no patch, and it's rather easy to trigger," the Metasploit developers said Monday in a blog post.

Even though a patch is not yet available, Microsoft has released a "Fix it" solution that prevents the exploitation of this vulnerability in Internet Explorer. "We strongly suggest that you consider this workaround - for now," Sophos senior threat researcher Paul Baccas said in a blog post on Tuesday.


Follow Us

Join the newsletter!

Error: Please check your email address.

Featured

Slideshows

Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
Show Comments