Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    IE Patch Intros New Exploitable Vulnerability

    Written by

    Ryan Naraine
    Published August 22, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      On the same day Microsoft is expected to re-release an Internet Explorer security update, a private security research outfit is warning that the original patch actually introduced an exploitable vulnerability.

      The new warning comes less than a week after Microsoft offered a private hotfix for the browser because of a glitch that caused unexpected crashes.

      However, according to an advisory from eEye Digital Security, the browser crash could cause a “high risk” buffer overflow that could lead to code execution attacks.

      “After investigating and confirming that indeed this is an exploitable condition, we are alerting people to the true severity of these crashing problems that people are experiencing, so that they can take the appropriate mitigation steps as need be,” said Marc Maiffret, chief hacking officer at eEye, in Aliso Viejo, Calif.

      Microsoft confirmed eEyes new discovery and said the updated IE patch would be delayed indefinitely.

      “Due to an issue discovered in final testing that impacts a customers ability to broadly deploy the update, Microsoft will not be re-releasing MS06-042 today [Aug. 22],” a company spokesperson said in a statement sent to eWEEK.

      Microsoft also posted a security advisory that pinpointed the issue as “long URLs to sites using HTTP 1.1 and compression.”

      The company also chided eEye for going public with its findings before a comprehensive fix could be made available.

      However, Maiffret noted that his companys warning never included any details that could point to the cause of the bug.

      Instead, he noted that Microsofts advisory mentions “long URLs” as the cause.

      “We never mentioned long URLs publicly anywhere because we did not want to release any details,” Maiffret said, pointing out that Microsoft has released more information on the bug than anyone else.

      Maiffret said the exploitable flaw affects Windows 2000 with IE6 SP1 and MS06-042 hotfix installed; and Windows XP SP1 with IE6 SP1 and MS06-042 hotfix installed.

      The original patches were shipped as part of the MS06-042 cumulative security update for Internet Explorer, but immediately after the release of the patch on Aug. 8, IE users complained that the browser was crashing when viewing certain Web sites.

      On Aug. 11, Microsoft acknowledged the browser crash issues with a knowledge base article and said it was only happening on Web sites using the HTTP 1.1 protocol and compression.

      A hotfix was offered to businesses through Microsofts PSS (Product Support Services), and the company said it would re-release the full IE update on Aug. 22.

      According to eEyes Maiffret, the new exploitable issue is already known in research circles and exploit writers.

      “[It] is important that IT administrators understand the true threat of this problem, that this is not simply a crashing bug as Microsoft has been incorrectly misrepresenting it, but in fact that it is an exploitable security bug,” he said.

      “Researchers and exploit developers know this, therefore it is extremely important that IT administrators are told what really is going on,” he added.

      Maiffret recommends that affected IE users disable HTTP 1.1 functionality in the browser.

      He also suggested that Windows users upgrade to Windows XP SP2 (Service Pack 2) to protect against the vulnerability.

      Public support for Windows XP SP1 ends in October 2006.

      Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.