Print 65 comment(s) - last by MrPoletski.. on Dec 23 at 9:12 AM

A new security flaw discovered in Microsoft's Internet Explorer has the company and its customers losing much sleep

News broke in the security world earlier this week that a critical vulnerability had been found in Microsoft's Internet Explorer 7.  The vulnerability could be used to take over computers and is known to be currently being used to steal passwords.

Rick Ferguson, a senior security adviser at security firm Trend Micro says thus far the hole has only been exploited to steal online game passwords, but the attacks could become much more serious for unpatched users.  He states, "It is inevitable that it will be adapted by criminals. It's just a question of modifying the payload the trojan installs."

The seriousness of the flaw was evidenced by Microsoft's rather public announcement of the vulnerability and panicked rush to develop a patch.  So-called "out-of-band" announcements from Microsoft are rare. 

In this case it made such an announcement, stating in a press release, "Microsoft teams worldwide have been working around the clock to develop a security update to help protect our customers.  Until the update is available, Microsoft strongly encourages customers to follow the Protect Your Computer Guidance at, which includes activating the Automatic Update setting in Windows to ensure that they receive the update as soon as it is available."

Microsoft has announced that it will have a patch for the vulnerability by 1800 GMT on 17 December, available via Windows Update.

Some experts have suggested that corporate and private users switch browsers, to an alternative such as Firefox, Opera, or Chrome until the security flaw is patched on affected systems.  Only Microsoft Internet Explorer 7 is vulnerable to this latest attack.

However, some security experts are cautioning that a switch may be equally problematic.  Says Graham Cluley, senior consultant with security firm Sophos, "Firefox has issued patches and Apple has too. Whichever browser you are using you have to keep it up to date.  People have to be prepared and willing to install security updates. That nagging screen asking if you want to update should not be ignored."

The report ironically follows fast on a report that Firefox is a dangerously vulnerable application for businesses.  Apple's Safari has also been blasted within the last year for poor security and patching

Even the security of major open source software, not a popular target for hackers who heavily use such software, was recently brought into question when a major encryption scheme was found to be broken.  All of these instances illustrating the growing challenge of computer security, the difficulty with being a market leader (and thus a mark), and need for diligence when it comes to patches and updates.

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: Whats the exploit?
By Smilin on 12/17/2008 6:05:11 PM , Rating: 2
It's a bad pointer reference, not a buffer overflow.

Buffer overflows don't get very far today on Vista at least.

It allows code to run with logged on user privledges. If Vista I believe you may still be limited to the non-admin part of the security token by UAC. I'm not positive on this part but it's a good assumption.

It's also not something that can self propogate. It still requires each user visiting a hacked/malicious site or being tricked into clicking a link in email. If it's outlook they click the link in, it will run the page in the restricted zone so there isn't much trouble that can be caused.

There is a webcast on the vulnerability available now. It looks like a flaw that had some potential to be ugly on a single user basis but MS jumped on it pretty quick (9 day turnaround basically)

RE: Whats the exploit?
By GaryJohnson on 12/17/2008 11:12:24 PM , Rating: 2
Buffer overflows don't get very far today on Vista at least.

But they do in XP...

RE: Whats the exploit?
By Smilin on 12/18/2008 10:47:16 AM , Rating: 3
Sure to some degree as long as you don't bump into DEP. If you are still running a almost 6 year old OS then you should expect 6 year old security.

"We’re Apple. We don’t wear suits. We don’t even own suits." -- Apple CEO Steve Jobs

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki