{"id":12263,"date":"2018-05-10T13:10:03","date_gmt":"2018-05-10T21:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/10\/news-6032\/"},"modified":"2018-05-10T13:10:03","modified_gmt":"2018-05-10T21:10:03","slug":"news-6032","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/10\/news-6032\/","title":{"rendered":"Internet Explorer zero-day: browser is once again under attack"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 10 May 2018 19:58:00 +0000<\/strong><\/p>\n<p>In late April, two security companies (<a href=\"http:\/\/blogs.360.cn\/blog\/cve-2018-8174-en\/\" target=\"_blank\" rel=\"noopener\">Qihoo360<\/a> and <a href=\"https:\/\/securelist.com\/root-cause-analysis-of-cve-2018-8174\/85486\/\" target=\"_blank\" rel=\"noopener\">Kaspersky<\/a>) independently discovered a zero-day for Internet Explorer (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-8174\" target=\"_blank\" rel=\"noopener\">CVE-2018-8174<\/a>), which was used in targeted attacks for espionage purposes. This marks two years since a zero-day has been found (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0189\" target=\"_blank\" rel=\"noopener\">CVE-2016-0189<\/a> being the latest one) in the browser that won&#8217;t die, despite efforts from Microsoft to move on to the more modern Edge.<\/p>\n<p>The vulnerability exists in the VBScript engine and how it handles memory objects. It will also affect IE11 even though VBScript is <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/internet-explorer\/ie-developer\/compatibility\/dn384057(v=vs.85)\" target=\"_blank\" rel=\"noopener\">no longer supported<\/a>\u00a0by using the compatibility tag for IE10.<\/p>\n<p>The attack came via a Word document making use of\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/cve-2017-0199-used-to-deliver-modified-rms-agent-rat\/\" target=\"_blank\" rel=\"noopener\">OLE autolink objects<\/a> to retrieve the exploit and shellcode from a remote server. However, it is important to note that it could very well have been executed by visiting a website instead.<\/p>\n<p>Perhaps one of the reasons why it was not used as a drive-by download attack may be related to the targets running another browser as their default (i.e. Chrome) where the exploitation would never occur. However, by tricking their victims to open an Office document, the attackers can force Internet Explorer to load, thanks in part to the <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/921560\" target=\"_blank\" rel=\"noopener\">URL moniker<\/a> &#8220;feature.&#8221;<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23676\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/attachment\/doc-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc.png\" data-orig-size=\"796,656\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"doc\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc-300x247.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc-600x494.png\" class=\"size-full wp-image-23676 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc.png\" alt=\"\" width=\"796\" height=\"656\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc.png 796w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc-300x247.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/doc-600x494.png 600w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\" \/><\/a><\/p>\n<p>Using <a href=\"https:\/\/github.com\/DidierStevens\/DidierStevensSuite\/blob\/master\/rtfdump.py\" target=\"_blank\" rel=\"noopener\">rtfdump.py<\/a>, we see the call for an HTTP connection:<\/p>\n<p><em><strong>python rtfdump.py -s 320 -H CVE-2018-8174.rtf<\/strong><\/em><\/p>\n<pre>000014C0: 70 B2 86 8C 53 30 05 43 00 38 30 01 18 68 00 74 p\ufffd\ufffd\ufffdS0.C.80..<span style=\"color: #ff0000;\">h<\/span>.<span style=\"color: #ff0000;\">t<\/span>  000014D0: 00 74 00 70 00 3A 00 2F 00 2F 00 61 00 75 00 74 .<span style=\"color: #ff0000;\">t<\/span>.<span style=\"color: #ff0000;\">p<\/span>.<span style=\"color: #ff0000;\">:<\/span>.<span style=\"color: #ff0000;\">\/<\/span>.<span style=\"color: #ff0000;\">\/<\/span>.<span style=\"color: #ff0000;\">a<\/span>.<span style=\"color: #ff0000;\">u<\/span>.<span style=\"color: #ff0000;\">t<\/span>  000014E0: 00 6F 00 73 00 6F 00 75 00 6E 00 64 00 63 00 68 .<span style=\"color: #ff0000;\">o<\/span>.<span style=\"color: #ff0000;\">s<\/span>.<span style=\"color: #ff0000;\">o<\/span>.<span style=\"color: #ff0000;\">u<\/span>.<span style=\"color: #ff0000;\">n<\/span>.<span style=\"color: #ff0000;\">d<\/span>.<span style=\"color: #ff0000;\">c<\/span>.<span style=\"color: #ff0000;\">h<\/span>  000014F0: 00 65 00 63 00 6B 00 65 00 72 00 73 00 2E 00 63 .<span style=\"color: #ff0000;\">e<\/span>.<span style=\"color: #ff0000;\">c<\/span>.<span style=\"color: #ff0000;\">k<\/span>.<span style=\"color: #ff0000;\">e<\/span>.<span style=\"color: #ff0000;\">r<\/span>.<span style=\"color: #ff0000;\">s<\/span>.<span style=\"color: #ff0000;\">.<\/span>.<span style=\"color: #ff0000;\">c<\/span>  00001500: 00 6F 00 6D 00 2F 00 73 00 32 00 2F 00 73 00 65 .<span style=\"color: #ff0000;\">o<\/span>.<span style=\"color: #ff0000;\">m<\/span>.<span style=\"color: #ff0000;\">\/<\/span>.<span style=\"color: #ff0000;\">s<\/span>.<span style=\"color: #ff0000;\">2<\/span>.<span style=\"color: #ff0000;\">\/<\/span>.<span style=\"color: #ff0000;\">s<\/span>.<span style=\"color: #ff0000;\">e<\/span>  00001510: 00 61 00 72 00 63 00 68 00 2E 00 70 00 68 00 70 .<span style=\"color: #ff0000;\">a<\/span>.<span style=\"color: #ff0000;\">r<\/span>.<span style=\"color: #ff0000;\">c<\/span>.<span style=\"color: #ff0000;\">h<\/span>.<span style=\"color: #ff0000;\">.<\/span>.<span style=\"color: #ff0000;\">p<\/span>.<span style=\"color: #ff0000;\">h<\/span>.<span style=\"color: #ff0000;\">p<\/span>  00001520: 00 3F 00 77 00 68 00 6F 00 3D 00 37 00 00 00 00 .<span style=\"color: #ff0000;\">?<\/span>.<span style=\"color: #ff0000;\">w<\/span>.<span style=\"color: #ff0000;\">h<\/span>.<span style=\"color: #ff0000;\">o<\/span>.<span style=\"color: #ff0000;\">=<\/span>.<span style=\"color: #ff0000;\">7<\/span>....<\/pre>\n<p>This remote request will download a VBS script. A Proof of Concept adapted from the <a href=\"https:\/\/securelist.com\/root-cause-analysis-of-cve-2018-8174\/85486\/\" target=\"_blank\" rel=\"noopener\">blog<\/a> that was published by Kaspersky can be seen below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23678\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/attachment\/exploit_code\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code.png\" data-orig-size=\"810,561\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"exploit_code\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code-300x208.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code-600x416.png\" class=\"size-full wp-image-23678 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code.png\" alt=\"\" width=\"810\" height=\"561\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code.png 810w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code-300x208.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/exploit_code-600x416.png 600w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/a><\/p>\n<p>The flaw abused by this vulnerability relates to a reference count that is checked at the beginning of the function but not after, despite the chance of it being incremented along the way. This allows an attacker to execute malicious shellcode and eventually load the malware binary of his choice.<\/p>\n<p>We tested this Use After Free (UAF) vulnerability with the publicly available PoC running Internet Explorer 11 under Windows 10. The browser crashes once it loads the VBS code, but with\u00a0<a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a>, the attack vector is mitigated:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/CVE-2018-8174_Win10.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23684\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/attachment\/cve-2018-8174_win10\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/CVE-2018-8174_Win10.gif\" data-orig-size=\"1129,727\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"CVE-2018-8174_Win10\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/CVE-2018-8174_Win10-300x193.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/CVE-2018-8174_Win10-600x386.gif\" class=\"size-full wp-image-23684 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/CVE-2018-8174_Win10.gif\" alt=\"\" width=\"1129\" height=\"727\" \/><\/a><\/p>\n<p>Microsoft has released a <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8174\" target=\"_blank\" rel=\"noopener\">patch<\/a> for this vulnerability, and we strongly advise to apply it, as it is just a matter of time before other threat actors start leveraging this new opportunity in spam or exploit kit campaigns.<\/p>\n<p>We will update this blog if we obtain more information about this vulnerability being used widely, and in particular, if a full working exploit is available.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\">Internet Explorer zero-day: browser is once again under attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Thu, 10 May 2018 19:58:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/' title='Internet Explorer zero-day: browser is once again under attack'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Internet Explorer is yet again leveraged for a zero-day exploit delivered via Office document\u2014the first zero-day observed for IE in over two years.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/0day\/\" rel=\"tag\">0day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2018-8174\/\" rel=\"tag\">CVE-2018-8174<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day\/\" rel=\"tag\">zero day<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/' title='Internet Explorer zero-day: browser is once again under attack'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\">Internet Explorer zero-day: browser is once again under attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14741,18334,10987,10494,11524],"class_list":["post-12263","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-0day","tag-cve-2018-8174","tag-exploits","tag-threat-analysis","tag-zero-day"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12263"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12263\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12263"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}