Saturday, November 01, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Pirate Bay Co-founder Sentenced To 42 Months Imprisonment
SEL Showcases 1058ppi And Foldable OLED Displays
New Outlook for Mac Available Now, Office for Mac Coming In 2015
Updated BBM Offers More Privacy, Control and More
Panasonic Raises Profit Outlook
Toshiba Offers New 4TB and 5TB Desktop HDDs
Samsung Introduces New Ultra Slim Galaxy A5 and Galaxy A3 Smartphones For The Chinese Market
Sharp 2Q Profit Slides
Active Discussions
DVD/DL for Optiarc 7191S at 8X
Copied dvd's say blank in computer only
Made video, won't play back easily
New Features In Firefox 33
updated tests for dvd and cd burners
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
 Home > News > General Computing > New Vul...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, March 10, 2010
New Vulnerability Targets Internet Explorer 6 and Internet Explorer 7


Microsoft annoucned todat that it was investigating new, public reports of a vulnerability in Internet Explorer 6 and Internet Explorer 7.

According to Microsoft's investigation, Internet Explorer 8, is not affected. The main impact of the vulnerability is remote code execution, Microsoft said.

Microsoft said that Internet Explorer 8 and Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 were not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6 and Internet Explorer 7 were vulnerable.

The vulnerability exists due to an invalid pointer reference being used within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution, Microsoft added.

"At this time, we are aware of targeted attacks attempting to use this vulnerability. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs," Microsoft said in a security advisor released today.

Protected Mode in Internet Explorer on Windows Vista and later Windows operating systems helps to limit the impact of the vulnerability as an attacker who successfully exploited this vulnerability would have very limited rights on the system. An attacker who successfully exploited this vulnerability on Internet Explorer 6 or Internet Explorer 7 could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights, Microsoft said.

In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker?s Web site.

By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone, Microsoft added.

By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone, removing the risk of an attacker being able to use this vulnerability to execute malicious code. The Restricted sites zone helps mitigate attacks that could try to exploit this vulnerability by preventing Active Scripting and ActiveX controls from being used when reading HTML e-mail messages. However, if a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario. Additionally, Outlook 2007 uses a different component to render HTML e-mail, removing the risk of this exploit.


Previous
Next
OCZ Makes Solid State Storage More Affordable with Introduction of Onyx Series SSD        All News        Dell Unleashes Powerful 15.6-inch Mobile Workstation
Biking Directions On with Google Maps     General Computing News      Google Opens App Store For Business

Get RSS feed Easy Print E-Mail this Message

Related News
Microsoft Introduces The Microsoft Health And Band
Microsoft To Embrace Real-Time Browser-based Calls
Microsoft Said To Be Developing Windows Server OS for ARM-Based Servers
Microsoft To Keep Nokia Brand For Low-end Smartphones
Cloud and Surface 3 Drive Microsoft's Revenue
Microsoft And Dell Puts Azure In A Box
Microsoft To Launch A Wearable Device Soon
Microsoft CEO Apologizes For Suggesting Women not Ask for Raises
Microsoft says Samsung owes Millions in unpaid Patent Royalties
Microsoft Wireless Display Adapter Connects Miracast Devices to HDTVs
Microsoft Releases New Arc Touch Bluetooth Mouse, PC Accessories
Microsoft To Hold Next-generation Windows Event

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .