{"id":14951,"date":"2014-05-05T17:10:54","date_gmt":"2014-05-05T17:10:54","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1760"},"modified":"2019-11-15T07:19:43","modified_gmt":"2019-11-15T12:19:43","slug":"ie-0day-and-windows-xp-microsofts-tough-decision","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ie-0day-and-windows-xp-microsofts-tough-decision\/14951\/","title":{"rendered":"IE 0day and Windows XP: Microsoft&#8217;s tough decision"},"content":{"rendered":"<p>Microsoft had to deal with a new less-than-pleasant vulnerability in Internet Explorer browser, which affected all of its versions starting with IE6 in all of its operational systems including the recently \u2018discarded\u2019 Windows XP. Microsoft had to make a tough choice. And it did.<\/p>\n<p>As we all know, as of April 8th, 2014 Windows XP has \u2018officially\u2019 gone off into the sunset: it\u2019s no longer supported by Microsoft. Just before this happened, many voices were predicting doom, and, frankly, there was at least some merit in their arguments. Windows XP may have been discarded by Microsoft, but there are still millions of people using it, which means that malware writers and hackers are going to look hard for new bugs and vulnerabilities to exploit. Without technical support from Microsoft, there will be no new patches for these bugs, so they can be exploited indefinitely, and this is actually a threat to everyone, not just Windows XP aficionados.<\/p>\n<p>Now it looks like those doom-spellers were right: it didn\u2019t take long before a new bug affecting Windows XP was discovered: a vulnerability present in all, more or less, current versions of Internet Explorer.<\/p>\n<p>On April 26, 2014, Microsoft notified its customers of a vulnerability in Internet Explorer along with a zero-day exploit that has already been used in the wild \u2013 in \u201climited, targeted attacks\u201d. Apparently, it was FireEye that discovered those attacks in the first place.<\/p>\n<p>According to FireEye\u2019s <a href=\"http:\/\/www.fireeye.com\/blog\/uncategorized\/2014\/04\/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html\" target=\"_blank\" rel=\"noopener nofollow\">data<\/a>, the initial attack targeted users of IE versions 9, 10, and 11 on Windows 7 and 8, although the vulnerability actually affected all versions of IE from 6 to 11. It really didn\u2019t take long before a new version of the exploit was discovered, this time targeting Windows XP machines running Internet Explorer 8.<\/p>\n<p>There is a large amount of <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms14-021\" target=\"_blank\" rel=\"noopener nofollow\">technical data<\/a> on the vulnerability itself. In short, by convincing a user to view a specially crafted HTML document attackers are able to execute an arbitrary code in the system. <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/222929\" target=\"_blank\" rel=\"noopener nofollow\">According to CERT\u2019s description<\/a>, \u201cthe Internet Explorer vulnerability is used to corrupt Flash content in a way that allows ASLR to be bypassed via a memory address leak. This is made possible with Internet Explorer because Flash runs within the same process space as the browser.\u201d CERT also acknowledges that exploitation without the use of Flash may be possible, even though disabling a Flash plugin in IE is one of the workarounds for the problem.<\/p>\n<p>In other words it isn\u2019t a pleasant situation: The U.S. Department of Homeland Security even <a href=\"https:\/\/www.yahoo.com\/tech\/new-security-flaw-affects-all-versions-of-internet-84085229159.html\" target=\"_blank\" rel=\"noopener nofollow\">advised<\/a> not to use Internet Explorer until the patch is in place.<\/p>\n<p>Microsoft found itself in hot water with this. The company had a tough choice: to stick to its earlier decision to cease Windows XP support and tell its (millions of) remaining users to help themselves and to upgrade at last, or give them a hand \u2013 as a contingency measure.<\/p><blockquote class=\"twitter-pullquote\"><p>Microsoft had to choose: to stick to its decision to cease Windows XP support or to make an exception.\u00a0<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FWE6T&amp;text=Microsoft+had+to+choose%3A+to+stick+to+its+decision+to+cease+Windows+XP+support+or+to+make+an+exception.%C2%A0\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In any case it was going to get slammed for either leaving millions of users in the cold or for indulging people who do nothing to protect themselves.<\/p>\n<p>Microsoft corporation chose the latter: \u201cas an exception\u201d it patched the vulnerability in all affected versions of Internet Explorer, providing an update for all versions of Windows XP too.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020243\/640.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1761\" alt=\"640\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020243\/640.jpg\" width=\"640\" height=\"320\"><\/a><\/p>\n<p><a href=\"http:\/\/arstechnica.com\/security\/2014\/05\/microsofts-decision-to-patch-windows-xp-is-a-mistake\/\" target=\"_blank\" rel=\"noopener nofollow\">And it got slammed for that, just as expected<\/a>: \u201cThe decision to release this patch is a mistake,\u201d said Ars Technica, saying that such one-off \u201cexceptions\u201d do not make Internet Explorer on Windows XP any safer. Instead it makes a false impression that it\u2019s okay to keep going with Windows XP. IT people who knew they needed to migrate (and needed a budget for this) kept telling their superiors that Microsoft wasn\u2019t going to provide any patches beyond April 8th. Now they are in the hot water too, because, from a business owner\u2019s point of view, if there was one \u201cexception\u201d why shouldn\u2019t there be another? And another? Why, again, can\u2019t Microsoft just extend the Windows XP support further infinitely?<\/p>\n<div class=\"pullquote\">Microsoft chose to help out Windows XP users too, and got slammed for this.<\/div>\n<p>\u201cThe job of migrating away from Windows XP just got a whole lot harder,\u201d Ars Technica said. And for good reason.<\/p>\n<p>This situation is indeed a thought-provoking one. Windows XP has been around for too long, and because of this, has had too many things go wrong. Microsoft, after years of preparations, warnings and admonitions, finally axed Windows XP support\u2026 and almost immediately released a new patch \u2013 along with explanations:<\/p>\n<p>\u201cEven though Windows XP is no longer supported by Microsoft and is past the time we normally provide security updates, we\u2019ve decided to provide an update for all versions of Windows XP (including embedded), today. We made this exception based on the proximity to the end of support for Windows XP. The reality is there have been a very small number of attacks based on this particular vulnerability and concerns were, frankly, overblown.\u00a0 Unfortunately this is a sign of the times and this is not to say we don\u2019t take these reports seriously.\u00a0 We absolutely do,\u201d <a href=\"http:\/\/blogs.technet.com\/b\/microsoft_blog\/archive\/2014\/05\/01\/updating-internet-explorer-and-driving-security.aspx\" target=\"_blank\" rel=\"noopener nofollow\">said<\/a> Adrienne Hall, General Manager for Trustworthy Computing department at Microsoft.<\/p>\n<p>Maybe we should thank Microsoft for their concern, but then again, maybe not.<\/p>\n<p>Microsoft keeps trumpeting the fact that people need to move away from Windows XP for security reasons, but acts as if there\u2019s no hurry at all.<\/p>\n<p>As for this IE vulnerability and its 0day exploits, there are multiple sophisticated protection technologies in Kaspersky Lab products that are designed specifically to block even unknown threats such as zero-day exploits. Automatic Exploit Prevention is one of these technologies. And now we can confirm that newly discovered exploits for this IE vulnerability are successfully detected and blocked out by our solutions, so our customers are safe.<\/p>\n<p>We fully understand that it will take time for Windows XP to go away completely. The sooner it happens, the better: migration from Windows XP is a necessary <i>security measure<\/i>. But still we will continue support for Windows XP in our products until 2016.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft had to deal with a new less-than-pleasant vulnerability in Internet Explorer browser, which affected all of its versions starting with IE6 in all of its operational systems including the<\/p>\n","protected":false},"author":209,"featured_media":16078,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[121,600],"class_list":{"0":"post-14951","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-updates","10":"tag-windows-xp"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ie-0day-and-windows-xp-microsofts-tough-decision\/14951\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ie-0day-and-windows-xp-microsofts-tough-decision\/14951\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ie-0day-and-windows-xp-microsofts-tough-decision\/14951\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/updates\/","name":"updates"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14951"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14951\/revisions"}],"predecessor-version":[{"id":30943,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14951\/revisions\/30943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16078"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}