Microsoft Internet Explorer ActiveX Control Code Execution Vulnerability
Date: 12 November 2013
The purpose of this Alert is to raise awareness of an Internet Explorer zero-day vulnerability that is being actively exploited to achieve code execution.
The recently disclosed vulnerability is due to an error in the ActiveX Control within Internet Explorer (CVE-2013-3918). Successful exploitation of this vulnerability allows for the execution of arbitrary code. Reports indicate that at least one website has been compromised to facilitate drive-by download attacks in order to compromise the systems of visitors to this website. This vulnerability will be patched on November 12, 2013 as part of Microsoft’s monthly security update and will be released as MS13-090.
CCIRC recommends that system administrators identify their affected assets and potential interdependencies with their organization's critical services and follow their patch management process accordingly.
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: