Microsoft Corp. on Wednesday released another cumulative patch for Internet Explorer that fixes two new critical vulnerabilities in the browser. The two flaws are somewhat related in that they both involve problems with IEs cross-domain security model.
The first vulnerability could allow an attacker to run malicious code on a users machine by misusing certain dialog boxes. In order to exploit the issue, the attacker would need to create a malicious Web page and then entice a user to visit the page. Once the user visits the page, the attacker could misuse a dialog box in such a way that the script could access information in a different domain and possibly execute code on the users machine.
The other flaw allows IEs showHelp() function to execute without the correct security checks. This function is used to display HTML pages with help content, but it allows more pluggable protocols than it should. This could enable an attacker to access user information, run executables that are already on the users machine or execute arbitrary code on the users PC.
Both vulnerabilities affect IE 5.01, 5.5 and 6.0.
The patch for these vulnerabilities is located here.
Microsoft, of Redmond, Wash., also released a patch for a buffer overflow vulnerability in the Windows Redirector service in Windows XP. Windows uses the service to locate local and remote files. The vulnerability enables an attacker to either crash Windows or run code on the users machine by sending a specially formed set of data to the service.
The patch for this flaw is here.
- Read more stories by Dennis Fisher
- Read more security stories