Security Advisory - December 31, 2012
Zscaler Protects Against 0Day Vulnerability in Internet Explorer used in CFR ‘Watering Hole’ Attack
Zscaler, working with Microsoft through their MAPPs program has proactively deployed protections for the following security vulnerability in Internet Explorer. Reports recently emerged on malware hosted at the Council on Foreign Relations (CFR) website that was leveraging a previously unknown vulnerability. It is being called a ‘watering hole’ attack as it is believed that the CFR website was specifically selected to target particular users of the site. At the present time, Microsoft has released a security advisory (2794220) detailing the vulnerability and recommended workarounds until a patch is available. The Zscaler cloud will detect and block websites leveraging this new vulnerability. Zscaler will continue to monitor exploits associated with this issue and deliver additional protections as needed.
Microsoft Security Advisory (2794220)
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
CVE-2012-4792 - Vulnerability in Internet Explorer Could Allow Remote Code Execution
Description: The vulnerability is a remote code execution vulnerability that exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.