Vulnerabilities / Threats
11/24/2009
04:17 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Issues Internet Explorer Security Advisory

Users of Internet Explorer 6 and 7 may be vulnerable to a malware attack.

The publication of proof-of-concept exploit code affecting Internet Explorer 6 and 7 over the weekend prompted Microsoft on Monday to issue a Security Advisory.

Microsoft says that it is investigating the reported vulnerability, which affects Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6 and Internet Explorer 7 on Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.

Internet Explorer 5.01 Service Pack 4 and Internet Explorer 8 are not affected.

Microsoft says that it is not aware of attacks attempting to exploit the reported vulnerability.

"The vulnerability exists as an invalid pointer reference of Internet Explorer," Microsoft's Advisory states. "It is possible under certain conditions for a CSS/Style object to be accessed after the object is deleted. In a specially-crafted attack, Internet Explorer attempting to access a freed object can lead to running attacker-supplied code."

The fact that Internet Explorer 6 and 7 together account for about 41% of the Web browser market means attackers will be tempted to exploit the vulnerability, says Michael Sutton, VP of security research at Zscaler, a computer security company.

"Attacks such as these are also prime candidates for targeting otherwise legitimate Web sites as an attack vector," Sutton said in an e-mailed statement. "The exploit can be triggered simply via HTML code, so attackers can inject code into Web sites with weak security protections."

According to Symantec Security Response, the proof-of-concept exploit exhibits inconsistent behavior.

Symantec expects that future exploits prove more effective.

While Microsoft has yet to issue a patch for the vulnerability, its advisory offers several ways to mitigate the risk of attack.

Finding the flaws in your operating systems and applications is only the beginning. You then need to plot a path to security and ensure that no new weaknesses find their way onto your network. This Dark Reading report focuses on how to do that. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.