Unfixed, these types of vulnerabilities are exploitable, though there are configurations that can be applied in order to bolster security. These are not the first occurrences of 0-days discovered this year; vulnerabilities were detected for Internet Explorer in January, May and September, for Oracle’s Java in January and March, and for Adobe’s Reader in February.
Zero-day vulnerabilities are code flaws that are being exploited by attackers in the wild, but which have no patch available. It often takes the vendor, in this case Microsoft or Oracle, another patch cycle, i.e. over 30 days to come out with an official patch. However, there is something that organizations can do in their defense -- they can configure their setups to allow for maximum defense.
In each of the recently released 0-day security advisories, Microsoft informed users that computers with EMET configured are immune against the attacks in their present forms. EMET stands for Enhanced Mitigation Experience Toolkit and is an additional security tool, freely downloadable from Microsoft’s website. It provides a kind of “straitjacket” for Windows programs, monitoring for abnormal behavior and aborting programs that misbehave.
Abnormal behavior, such as heapspraying or manipulation of exception handlers is often an indication of the early stages of cyber-attack should be investigated and prevented. The newest version of EMET added an alert-only capability, which should make it make easier for IT administrators to roll out in a larger IT installation.
Alert-only mode allows IT admins to run EMET in a monitoring mode to see if an organization’s workstations are running legitimate applications that misbehave and would be aborted running under normal mode. Applications can then be investigated and if necessary, exceptions can be configured.
For Oracle’s Java, there are similar recommendations for secure configurations. Known attack vectors use the “applet” Java mechanism, the easiest way to counter attacks is to disable the execution of Java in the browser altogether by disabling the browser plugin.
If applets are necessary for business applications, then IT administrators can look for a whitelisting solution that allows the applet to only run on sites that are necessary for the business. Microsoft’s Internet Explorer supports this type of whitelisting through its “Zone” mechanism, which prohibits Java in the “Internet” zone, but allows it in “Trusted Sites,” thus limiting the attack surface of an organization to sites that have a legitimate business need for Java applets.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.