Serious IE Hole Opens PCs Up to Attacks

 
 
By Matthew Broersma  |  Posted 2004-11-04 Email Print this article Print
 
 
 
 
 
 
 

The Internet Explorer flaw, which has been published on public mailing lists, allows attackers to take control of a PC via an HTML e-mail or malicious Web page.

US-CERT on Wednesday warned of a fresh hole in Internet Explorer that could allow attackers to take control of a PC via an HTML e-mail message or a malicious Web page. The flaw is all the more serious because exploit code has been published on public mailing lists, according to security researchers. The flaw, a heap buffer overflow, is in the way IE handles two attributes of the "frame" and "iframe" HTML elements. An exploit currently circulating uses overly long SRC and NAME attributes to cause IE to execute an attackers shell code, according to US-CERT.
Read here why Peter Coffee says IE flaws should come as no surprise.
Users could be attacked via a malicious Web page viewed in an affected version of IE or possibly through an HTML e-mail viewed in an application such as Outlook, Outlook Express, AOL or Lotus Notes that relies on the WebBrowser ActiveX control, according to researchers. The bug has been confirmed in IE 6.0 on Windows XP with SP1 and all patches installed, as well as the same browser on a fully patched Windows 2000, according to an advisory from security firm Secunia. Microsoft Corp. has not yet released a patch. Windows XP systems running Service Pack 2 do not appear to be affected, researchers said. Apart from installing SP2, system administrators can lessen the danger of an attack by disabling active scripting, avoiding unsolicited links that may lead to a malicious Web page and rendering e-mails in plain text, US-CERT said. Updated anti-virus programs may also be able to prevent some exploit attempts.
For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog. The fact that fully patched SP1 systems are vulnerable to the flaw, while SP2 systems are not, appears to show that the work put into Microsofts security-oriented update is paying off. A spoofing flaw in IE publicized over the weekend also affects pre-SP2 systems but is largely disabled by the service pack. Check out eWEEK.coms for the latest security news, reviews and analysis.
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel