Security experts discovered a Windows vulnerability rated as a medium-severity. This allows remote attackers to execute arbitrary code and it exists within the handling of error objects in JScript. Microsoft didn’t roll out a patch for the bug yet. Trend Micro’s Zero Day Initiative Group revealed that the flaw was discovered by Dmitri Kaslov of Telespace Systems.
The vulnerability is not exploited in the wild
There’s no indication of the vulnerability being exploited in the wild, according to Brian Gorenc, ZDI’s director. He explained that the bug would only be part of a successful attack. He continued and said that the vulnerability allows code execution in a sandboxed environment and attackers would need more exploits to escape the sandbox and execute their code on a target system.
The flaw allows remote attackers to execute arbitrary code on Windows installations but user interaction is required, and this makes things less horrible. The victim would have to visit a malicious page or open a malicious file which would allow the execution of the malicious JScript on the system.
The glitch is in Microsoft’s ECMAScript standard
This is the JScript component that’s used in Internet Explorer. This causes problems because by performing actions in the script, attackers could trigger a pointer to be reused after it has been freed. The bug was first sent to Redmond back in January this year. Now. It’s being revealed to the public without a patch. The flaw is labeled with a CVSS score of 6.8, says ZDI and this means it flaunts a moderate severity.
According to Gorenc, a patch will be on its way as soon as possible, but no exact date has been revealed. So, we don’t know if it will get included in the next Patch Tuesday. The only available advice is for users to restrict their interactions with the application to trusted files.