Vulnerabilities / Threats

3/30/2010
01:51 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Releases Emergency Internet Explorer Patch

The patch addresses 10 vulnerabilities in the Web browser; Internet Explorer 6 and 7 users are most at risk.

Microsoft on Tuesday released an emergency, or out-of-band, patch for 10 vulnerabilities in Internet Explorer.

"The Internet Explorer team accelerated testing of this update due to the growing attacks against the publicly disclosed vulnerability (CVE-2010-0806), and the update has reached the appropriate quality bar for distribution to customers," said Microsoft Security Response group manager Jerry Bryant in a blog post. "Releasing the update early provides Internet Explorer 6 and 7 customers protection against the active attacks and provides users of all versions of Internet Explorer protection against nine other vulnerabilities."

Symantec security researcher Joshua Talbot said in an e-mail that the catalyst for the patch is the increased activity related to the iepeers.dll zero-day vulnerability that surfaced March 9. "Symantec has also observed a recent spike in attempted infections via this security hole," he said. "The typical attempted infection process seems to involve compromising a legitimate Web site then inserting an iframe which redirects users to a malicious site."

Internet Explorer 6 and 7 users are at risk from the iepeers.dll vulnerability; Internet Explorer 8 users are not.

However, three of the other 10 vulnerabilities addressed by the out-of-band patch do affect Internet Explorer 8. Even so, Microsoft is urging customers using Internet Explorer 6 and 7 to upgrade to version 8.

Talbot says that while exploit code for the vulnerabilities other than iepeers.dll isn't yet available, he believes many of the holes will be "trivially exploitable under certain circumstances" and advises patching as soon as possible.

Bryant says that Microsoft cannot immediately provide information about whether the patch addresses the vulnerability used to hack Internet Explorer 8 in the "pwn2own" competition at the CanSecWest security conference last week.

The last time that Microsoft released an emergency patch for Internet Explorer was in January, following news that a vulnerability in Internet Explorer 6 had been used in the "Operation Aurora" cyber attack on Google and dozens of other companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10428
PUBLISHED: 2018-05-23
ILIAS before 5.1.26, 5.2.x before 5.2.15, and 5.3.x before 5.3.4, due to inconsistencies in parameter handling, is vulnerable to various instances of reflected cross-site-scripting.
CVE-2018-6495
PUBLISHED: 2018-05-23
Cross-Site Scripting (XSS) in Micro Focus Universal CMDB, version 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.0, CMS, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1 and Micro Focus UCMDB Browser, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1. This vulnerability could be remotely exploited to al...
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.