Microsoft issues emergency Fix-It tool for IE 8 zero-day vulnerability being exploited in the wild

Graham Cluley

ToolboxEarlier this month, Microsoft issued an advisory about what appeared to be a remote code execution vulnerability in Internet Explorer 8, that was being actively exploited in the wild by malicious hackers.

The vulnerability, known as CVE-​2013-​1347, was exploited by hackers in a hack on the US Department of Labor’s website, that infected visiting computers if they were running the vulnerable version of Internet Explorer.

There were also reports that the vulnerability was being exploited by online criminals in other attacks, increasing the necessity for Microsoft to patch its software.

Well, Microsoft still hasn’t released a patch – but if has issued what it describes as “an easy, one-click Fix it tool” that concerned users and companies can run on computers which use Internet Explorer 8.

Download and read more about the Fix It tool from Microsoft.

Note, however, that a Fix It tool to address known attack vectors that leverage the vulnerability is no replacement for a proper security patch.

Hopefully Microsoft will roll out a security update for the vulnerability before too many computer users are put at risk.

Please note that Internet Explorer 6, 7, 9 and 10 are not affected by this vulnerability – this seems to be purely an IE 8 security problem.

Graham Cluley Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy. Follow him on Twitter at @gcluley, or drop him an email.

One Reply to “Microsoft issues emergency Fix-It tool for IE 8 zero-day vulnerability being exploited in the wild”

  1. 29th October 2010Firefox has now been patched and it's no loengr vulnerable to this attack. If you have not done so make sure Firefox has its latest updates applied.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Never miss a thing. Sign up for the free GCHQ newsletter from Graham Cluley.
GET UPDATES