January 7, 2005 1:50 PM PST

IE flaw threat hits the roof

Related Stories

Phishing hole discovered in IE

December 17, 2004
Three unpatched flaws in Internet Explorer now pose a higher danger, a security company warned, after code to exploit one of the issues was published to the Internet.

Secunia said Friday that it had raised its rating of the vulnerabilities in Microsoft's browser to "extremely critical," its highest rating. The flaws, which affect IE 6, could enable attackers to place and execute programs such as spyware and pornography dialers on victims' computers without their knowledge, said Thomas Kristensen, Secunia's chief technology officer.

Exploit code for one of the vulnerabilities, a flaw in an HTML Help control, was published on the Internet on Dec. 21 in an advisory by GreyHats Security Group.

"In order for us to rate a vulnerability as extremely critical, there has to be a working exploit out there and one that doesn't require user interaction," Kristensen said. "This is our highest rating and is the last warning for users to fix their systems."

The exploit code can be used to attack computers running Windows XP even if Microsoft's Service Pack 2 patch has been installed, Secunia said. The company is advising people to disable IE's Active X support as a preventative measure, until Microsoft develops a patch for the problem. It also suggests using another browser product.

The Secunia advisory also warns of another HTML Help control vulnerability that, when used in combination with a drag-and-drop flaw, could be used to attack PCs--though in that case, it would have to be with the interaction of the victim. The company first issued an alert about the three security holes in October.

"Microsoft knew of this back in October," Kristensen said. "In my opinion, it's not fair to have a vulnerability known for two months without having an available patch, especially when every little detail (of the vulnerability) is out there."

"Microsoft is now aware of all three issues, and I'm sure they're giving it an even higher priority," he added.

Microsoft said it was investigating the public reports of the exploit, adding that the delay in fixing the IE patch was related to the extensive work needed to produce an effective patch.

"It's important to note that security response requires a balance between time and testing, and Microsoft will only release an update that is as well engineered and thoroughly tested as possible--whether that is a day, week, month or longer," a Microsoft representative said. "In security response, an incomplete security update can be worse than no patch at all if it only serves to alert malicious hackers to a new issue."

The company is advising people to check its safe browsing guidelines and to set their Internet security zone settings to "high." It also suggests that people continue installing automatic security updates from Service Pack 2.

This latest discovery marks another setback in Microsoft's efforts to shore up its security. When Microsoft launched SP2 in August, Chair Bill Gates touted it as a significant step in fortifying systems against attacks.

Secunia also offers users the ability to conduct an online test of their systems to see if they are vulnerable.

10 comments

Join the conversation!
Add your comment
Unrealistic
Setting the browser "Security" settings to HIGH will render the browsers virtually unuseable - given the large number of ASP and Java web pages out in the internet.

MS really has to stop coming out with excuses and concentrate on making their current products more secure - before they start peddling out the next generation OS (which will only contain the same bugs until they get around to fixing it).
Posted by Tex Murphy PI (165 comments )
Reply Link Flag
Exactly. Microsoft has to stop making excuses.
Why, does Microsoft ask us to disable the very features Microsoft themselves created to "enhance the user experience"?

Why, does Microsoft cause incompatibilities with SP2's firewall when the latest vulnerabilities continue to bypass SP2's supposed protection?

Too many questions, too many excuses.
Posted by hion2000 (115 comments )
Link Flag
browsers virtually unuseable
<a class="jive-link-external" href="http://www.analogstereo.com/honda_insight_owners_manual.htm" target="_newWindow">http://www.analogstereo.com/honda_insight_owners_manual.htm</a>
Posted by Al Johnsons (157 comments )
Link Flag
VIRUS INFECTED LINK
After reading thru the article located at <a class="jive-link-external" href="http://news.cbsi.com/IE+flaw+threat+hits+the+roof/2100-1002_3-5517457.html?tag=nl" target="_newWindow">http://news.cbsi.com/IE+flaw+threat+hits+the+roof/2100-1002_3-5517457.html?tag=nl</a> ......

I clicked the hyperlink labeled "online test of their systems" in the last paragraph. McAfee Virus Scan popped up on my system immediatetly declaring an infection had been detected. The html file indicated in the message could not be deleted or cleaned. A subsequent manual scan detected two infected .dll files, both of which were immediately deleted. Screenshots of all virus scan detections is available for verification purposes. This incident has been reported to my company's IT Security and Risk Managment depts.

I work for a large public utility company. My role in IT requires that I stay current with technology news. However, picking up a potentially malicious virus from a reputable source such as CNET News.com will not be tolerated and is a strike against the credibility of the site. Please verify your sources before posting links in the future.

Jason Hill
Posted by (1 comment )
Reply Link Flag
I think you have over-reacted
CNET is referencing a web site which offers to test the vulnerability. This vulnerability is demonstrated by executing a javascript code that is present on this page.

You did not pick up a "virus". What happened is that your filter detected the demonstration code, and correctly identified it as potentially malicious. It is not malicious in this case; it is sample code only.

Note that your system is not vulnerable -- your antivirus software is blocking the vulnerability, so in this case an MS patch is moot. Still, it would be good for MS to fix things and not rely on third parties to fix the problem for them.
Posted by (2 comments )
Link Flag
 

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot

Discussions

Shared

RSS Feeds

Add headlines from CNET News to your homepage or feedreader.