Newest IE bug could be next Conficker, says researcher

It's 'custom-made' for hackers, claims expert; expect major attacks

The critical bug that Microsoft confirmed Monday but has yet to patch is a prime candidate for another Conficker-scale attack, a security researcher said.

"It's better than [the vulnerability used by] Conficker," Roger Thompson, chief research officer at AVG Technologies, said yesterday. "It exposes the whole world, and can be exploited through the firewall. That's better than Conficker, which mostly did its damage once it got inside a network."

Conficker, the worm that exploded into prominence last January when it infected millions of machines, exploited an already-patched bug in Windows that Microsoft had thought dire enough to fix outside its usual update schedule.

The worm hijacked a large number of PCs -- estimates ranged as high as 12 million at one point -- and then assembled them into a massive botnet able to spread malware, plant fake antivirus software or distribute huge amounts of spam.

"I have no doubt that the really bad guys are bustling to get this [new vulnerability] into their exploit toolkits," said Thompson. "For the Conficker people, this could be the next thing. They waited until they had a really good exploit, then combined that with some smart strategies. So I wouldn't be surprised if they picked up on this."

The vulnerability Thompson's worried about is in the Microsoft Video Controller ActiveX Library, or the "msvidctl.dll" file, an ActiveX control that can be accessed using Internet Explorer (IE). Although the bug has been used by hackers since at least June 9, it only made it into the public eye this week, when several security companies, including firms in both China and Denmark, reported that thousands of compromised sites were serving up exploits.

On Monday, Microsoft acknowledged the vulnerability in a security advisory, said it would produce a patch and provided an automated tool to disable the ActiveX control by setting nearly three-dozen "kill bits" in the Windows registry.

"This is a good exploit with a big lump of infectable people," said Thompson.

One reason why the bug is an excellent choice for hackers is that it hasn't been patched. When Conficker first appeared, the flaw it exploited had already been patched by Microsoft. It turned out, however, that there were plenty of PCs that had not been updated with the fix.

Thompson wouldn't hazard a guess as to whether Microsoft would be able to craft a fix in time to add it to the patches slated for delivery next Tuesday, July's regularly-scheduled update day. "But I'm fairly confident that they're trying very hard," he said.

Attack code is readily available, Thompson said, meaning that attackers not yet abusing the bug don't have to figure out an exploit of their own. "If the people who infect banner ads use this before there's a patch, then watch out," he warned.

Today, Microsoft admitted that researchers at IBM's ISS X-Force had reported the vulnerability in 2008, but did not name the date. The X-Force researchers had uncovered the flaw in late 2007, and had reserved a CVE (Common Vulnerabilities and Exposures) number in December of that year. One of the researchers, Alex Wheeler, who is now the manager of 3Com's TippingPoint DVLabs, declined to name the date ISS reported the bug to Microsoft, citing a non-disclosure agreement he'd signed with his former employee.

Microsoft didn't directly answer a question about why it had not patched the ActiveX vulnerability when it has known about the bug for at least six months and possibly as many as 18. "When we were alerted in 2008, we immediately started an investigation," a company spokesman said today in an e-mail. "As we wanted to be thorough, this took extra time to fully evaluate."

The "extra time" Microsoft needed may strike some as odd, since the ActiveX control -- the "msvidctl.dll" file -- is the company's own code. And that's unusual, said Thompson. "This is the first issue with a Microsoft .dll for, really, a long while," Thompson said. "Maybe since the ANI bug in April 2007. Usually, it's a Chinese .dll or something from Adobe."

The vulnerability in Windows' animated cursor -- found in the "user32.dll" file -- was patched more than 100 days after Microsoft was alerted by Alexander Sotirov, a vulnerability researcher at Determina. Microsoft issued an "out-of-band" patch for the ANI bug, breaking from its regular monthly schedule.

"It's not the end of the world or anything," said Thompson. "But I won't be surprised to see Version 2.0 of Conficker with this. It seems custom-made for them."

Systems running Windows XP or Windows Server 2003 are vulnerable to current attacks through IE6 and IE7. Windows Vista and Windows 7 are not at risk; nor are users running IE8 or other browsers, such as Mozilla's Firefox and Google's Chrome.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags MicrosoftInternet Explorerconficker

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?