Internet Explorer Zero-Day Vulnerability
Internet Explorer Zero-Day Vulnerability
A new
zero-day vulnerability affecting all support versions of
Internet Explorer was reported by Microsoft on Tuesday, 17
September. The vulnerability may corrupt memory in a way
that could allow attackers to execute arbitrary code. The
attack works by enticing users to visit specifically crafted
websites that host the vulnerability through Internet
Explorer. At this time, the vulnerability is known to be
exploited in only a limited number of targeted attacks.
To ensure Symantec customers are protected against this vulnerability, Symantec has automatically pushed out the proper protection to all customers of its Norton security products as well as customers of Symantec Endpoint Protection. For this protection to be effective, all Symantec customers need to have IPS enabled. All Norton customers have IPS enabled by default.
Microsoft is aware of the vulnerability and posted an advisory. Microsoft has not yet released a patch for this vulnerability, although they have provided a temporary “Fix It” tool solution as a workaround until a security update is made available. End users will need to manually apply Microsoft’s fix for it to be effective. For more information, visit http://www.symantec.com/connect/blogs/new-internet-explorer-zero-day-found-targeted-attacks
Symantec will continue to investigate this vulnerability to ensure the best possible protection is in place.
ENDS