Tags: Internet Explorer, vulnerability, 0-day exploits
Users of Microsoft Internet Explorer versions 7, 8 and 9 is recommended as soon as possible to establish a temporary solution.
Microsoft has released a temporary solution to fix a critical vulnerability (CVE-2012-4969) in Microsoft Internet Explorer versions 7, 8 and 9. Browser users should promptly install it solution from the site manufacturer.
Recall that last week, security researcher Eric Romang in the study of one of the servers compromised participants hacker group Nitro, discovered an exploit for a previously unknown vulnerability in the browser Internet Explorer. For several days, the exploit code was publicly available in a modular platform Metasploit.
According to HD Moore, an employee of Rapid 7, released on the eve of a temporary solution from Microsoft in some cases can not fix the vulnerability. “Microsoft released Fix-IT for a zero-day vulnerability in IE, but test it with metasploit (the solution may not work),” – said HD Moore, accompanied by an entry in Twitter picture, which shows the successful operation of the console and Microsoft hotfix or window in the background.
Workarounds for the vulnerability is available at: http://support.microsoft.com/kb/2757760