Microsoft Issues Out of Cycle Fix for Zero Day Bug in Internet Explorer
"The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated," Microsoft explained in a security advisory. "The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website."
There have been two known attacks related to this particular flaw, one of which involved hackers using the U.S. Veterans of Foreign Wars website to deliver drive-by malware attacks. In that instance, hackers used malicious JavaScript code and an iFrame to target the zero day bug. Users who fell prey to the attack would receive a payload that downloads a backdoor ZxShell Trojan.
If you're running a version of IE that's affected by this bug, Microsoft recommends applying its "Fix It" solution titled "MSHTML Shim Workaround" to prevent exploitation. You can grab the Fix It solution direct from Microsoft.