Microsoft Warns of Zeroday XML Core Services Vulnerability

During their already busy Patch Day, Microsoft snuck out a security advisory warning their customers that attackers are  exploiting a previously undiscovered vulnerability in XML Core Services to launch drive-by download attacks in the wild.

Microsoft’s XML Core Services (MSXML)  is basically a component that helps Windows, Internet Explorer, and other Microsoft products to handle XML content. XML Core Services ships with various versions of Windows, and many other Microsoft products. If you have a Windows computer, you probably have XML Core Services installed.

According to the security advisory, XML Core Services suffers from an unpatched memory corruption vulnerability, which attackers can exploit to execute code on your machine. The attacker only has to lure you to a web site containing maliciously crafted code for his attack to succeed.

Since Microsoft first learned of this vulnerability through actual attacks in the wild, they haven’t had time to create and release a full patch yet. However, they have released what they call a “Fixit“, which is supposed to block this particular attack vector. If you manage a Microsoft network, I recommend you apply this Fixit on your Windows machines.

I’ll be sure to update you when Microsoft releases the real patch in the weeks or months to come. — Corey Nachreiner, CISSP (@SecAdept)

About Corey Nachreiner

Corey Nachreiner has been with WatchGuard since 1999 and has since written more than a thousand concise security alerts and easily-understood educational articles for WatchGuard users. His security training videos have generated hundreds of letters of praise from thankful customers and accumulated more than 100,000 views on YouTube and Google Video. A Certified Information Systems Security Professional (CISSP), Corey speaks internationally and is often quoted by other online sources, including C|NET, eWeek, and Slashdot. Corey enjoys "modding" any technical gizmo he can get his hands on, and considers himself a hacker in the old sense of the word.

Trackbacks/Pingbacks

  1. WatchGuard Security Week in Review: Episode 22 | WatchGuard Security Center - June 15, 2012

    [...] XML Core Services zero day  [...]

  2. WatchGuard Security Week in Review: Episode 22 | WatchGuard Security Center - June 15, 2012

    [...] XML Core Services zero day  [...]

  3. Bring on the July Microsoft Patches! | WatchGuard Security Center - July 6, 2012

    [...] post, Microsoft has confirmed they will fix the zero day XML Core Services vulnerability I mentioned last month. You’ll want to apply Microsoft’s Critical patches as quickly as you can next week; for [...]

  4. Microsoft Black Tuesday: Get the XML Core Services Patch Immediately | WatchGuard Security Center - July 10, 2012

    [...] issue this month is Microsoft’s fix for the zero day XML Core Services vulnerability. I first warned you about this unpatched code-execution vulnerability last month. In short, if an attacker can [...]

  5. Five July Windows Bulletins: MSXML Fix Included | WatchGuard Security Center - July 10, 2012

    [...] we mentioned in June, attackers have exploited this previously unpatched vulnerability in the wild for over a month. You [...]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 7,704 other followers

%d bloggers like this: