Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Guest Blog // Selected Security Content Provided By Sophos
What's This?
01:28 PM
Graham Cluley
Graham Cluley
Security Insights

Emergency Microsoft Internet Explorer Patch Arrives Thursday

The IT world sighed with relief at the news that Microsoft is releasing an out-of-band patch for Internet Explorer on Thursday, Jan. 21.

The IT world sighed with relief at the news that Microsoft is releasing an out-of-band patch for Internet Explorer on Thursday, Jan. 21.In a security advisory posted on its Website, Microsoft announced the emergency patch will not only address attacks that are targeting Internet Explorer 6 users, but it will also fix the vulnerability in versions 7 and 8 of the popular Web browser.

That's not just news for Internet Explorer users, of course. It's also positive news for the folks at Microsoft, who must have been smarting to learn rivals Firefox and Opera have seen an increase in downloads since European governments advised users to switch browsers.

I was always a bit wary of that advice, anyway. Many firms have found it hard enough to switch from the (now somewhat creaky) Internet Explorer version 6 to the latest edition, let alone deal with the possible complications that could arise when you change to another browser that your users might not be familiar with and that might not work with some of your Web applications.

It's good news for those of us who aren't working for one of the 30-odd companies targeted by Chinese hackers, too, since we are beginning to see other cybercriminals exploiting the flaw and placing it on copycat Websites in the hope of infecting unsuspecting users.

As you can see in the following video, it's really not hard to take advantage of the Internet Explorer exploit:

Microsoft should be praised for its rapid response to a critical situation. It couldn't have been easy for its team to produce the patch so quickly after news of the "Operation Aurora" hack attack broke. The Internet will be a little bit safer once everyone rolls out the patch.

Graham Cluley is senior technology consultant at Sophos, and has been working in the computer security field since the early 1990s. When he's not updating his award-winning blog on the Sophos website, you can find him on Twitter at @gcluley. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.
PUBLISHED: 2019-12-05
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.