Also known asÂ CVE-2010-0249,Â the Internet Explorer 0-day exploit takes advantage of a memory corruptionÂ vulnerability affecting all versions of Internet explorer except for InternetÂ Explorer 5.01 Service Pack 4 for Microsoft Windows 2000 Service Pack 4.
In order to successfully attack aÂ target, the remote party needs to create a malicious web page containing theÂ exploit a flaw in Internet Explorer’s handling of specific DOM operations. InÂ order to lure users into visiting the compromised resource, the attacker mayÂ use e-mail spam, social networking spam or any other means of mass distributionÂ available. As soon as the document gets processed, the malicious code injectedÂ into it would run in the context of the current user and would likelyÂ compromise the system. If the exploit fails, then the attack would trigger aÂ denial-of-service condition.
Under specific conditions,Â Internet Explorer can be tricked into allowing remote code execution byÂ accessing an invalid pointer after an object is deleted. Although all versionsÂ of Internet Explorer are vulnerable (Including IE8 on Windows 7), risks areÂ lower for IE8 users, as it comes with DEP (data execution prevention) enabledÂ by default.
According to preliminary reports,Â this vulnerability has already been used in targeted attacks against 34 majorÂ corporations including Google and Adobe. At the moment, Microsoft has released an advisory, but there is no patch available for this vulnerability. BitDefender has issued an emergency update that intercepts and blocks the malicious code before it adversely impacts on the target system.
The second critical vulnerability deals with AdobeÂ Reader. Also known as CVE-2009-4324,Â the vulnerability affects Adobe Reader and Acrobat 9.2 and earlier versions. Successful exploitation could cause crashes and allow a remote party to executeÂ arbitrary code on the victim’s computer, as well as to carry out cross-siteÂ scripting attacks.
In order to stay safe,Â BitDefender recommends that you download, install and update a completeÂ antimalware suite with antivirus, antispam, antiphishing and firewallÂ protection and to manifest extra caution when prompted to open files fromÂ unfamiliar locations.