Vulnerability in Microsoft Internet Explorer
Date: 17 Septembre 2013
The purpose of this Alert is to raise awareness of a vulnerability in Microsoft Internet Explorer (IE) which could allow remote code execution. (2887505)
CCIRC is aware that Microsoft is reporting a vulnerability affecting IE 8 and IE 9. This vulnerability is a remote code execution vulnerability and Microsoft is reporting that it is being used in targeted attacks.
CVE Reference: CVE-2013-3893
Microsoft advises that applying the Microsoft Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround", prevents the exploitation of this issue.
CCIRC recommends that system administrators identify their affected assets and potential interdependencies with their organization's critical services and follow their patch management process accordingly.
- A patch is not available at this time for this vulnerability, however, Microsoft is providing a Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround".
- Microsoft reports that Enhanced Mitigation Experience Toolkit (EMET 3.0/4.0) will make the vulnerability harder to exploit.
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: