According to a blog post by Dustin Childs, a group manager for communications in Microsoft’s Trustworthy Computing group, the security hole can be exploited when users visit a boobytrapped webpage:
This issue could allow remote code execution if an affected system browses to a website containing malicious content directed towards the specific browser type. This would typically occur when an attacker compromises the security of trusted websites regularly frequented, or convinces someone to click on a link in an email or instant message. Running modern versions of Internet Explorer ensures that customers receive the benefit of additional security features that can help prevent successful attacks.
Microsoft is trying to create a proper security update to protect against the flaw – but in the meantime, a temporary “Fix-It” tool, dubbed “”CVE-2013-3893 MSHTML Shim Workaround”, is available.
It’s worth underlining that unlike most fixes from Microsoft, this Fix-It tool will not be automatically rolled out to millions of users. If you want to protect your copy of Internet Explorer from having the flaw exploited, you need to download and run the tool.
And then, like the rest of the internet, you have to hope that Microsoft will roll out a proper and permanent reliable patch for the problem with appropriate haste.
My advice is that Windows users should run the Fix-It tool, especially if they use Internet Explorer to visit websites.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.