Menu
Unpatched Microsoft XML Core Services flaw increasingly targeted in attacks, researchers say

Unpatched Microsoft XML Core Services flaw increasingly targeted in attacks, researchers say

Sophos discovers new compromised websites that exploit the CVE-2012-1889 MSXML vulnerability

An unpatched vulnerability in the Microsoft XML Core Services (MSXML) is being exploited in attacks launched from compromised websites to infect computers with malware, according to security researchers from antivirus vendor Sophos.

One such attack was spotted Wednesday on the website of a European aeronautical parts supplier that had been hacked, Sophos senior technology consultant Graham Cluley said in a blog post. It follows a similar attack detected over the weekend on the compromised website of an European medical company, he said.

Both compromised websites had rogue code injected into them that loaded an exploit for the CVE-2012-1889 MSXML vulnerability when accessed in Internet Explorer.

"A hacker who manages to plant malicious code on the website of, say, a company which supplies aeronautical parts may reasonably predict that staff at a larger organisation - such as an arms manufacturer or defence ministry - might have reason to access the site," Cluley said.

The MSXML vulnerability is believed to have been exploited in state-sponsored attacks against Gmail users earlier this month. Microsoft issued a security advisory about the flaw on June 12 and advised customers to apply one of several proposed work-arounds until a final security patch is released.

Exploit code that works on all versions of Internet Explorer on Windows XP, Vista and 7 has been added to the Metasploit penetration testing framework. "We expect this vulnerability to grow even more dangerous since there's no patch, and it's rather easy to trigger," the Metasploit developers said Monday in a blog post.

Even though a patch is not yet available, Microsoft has released a "Fix it" solution that prevents the exploitation of this vulnerability in Internet Explorer. "We strongly suggest that you consider this workaround - for now," Sophos senior threat researcher Paul Baccas said in a blog post on Tuesday.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Events

Featured

Slideshows

Channel kicks 2021 into gear as After Hours returns to Auckland

Channel kicks 2021 into gear as After Hours returns to Auckland

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Pantry at Park Hyatt in Auckland to kick-start 2021.

Channel kicks 2021 into gear as After Hours returns to Auckland
The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Show Comments