Thursday, March 30, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Windows 10 Creators Update Coming April 11
Samsung Galaxy S8 and S8+ Are Official, Along With Bixby And New Gear 360
Razer Blade Pro IS The First THX Certified Gaming Laptop
Lenovo Makes Pro Virtual Reality Accessible With the ThinkStation P320
Intel Details 10, 22nm Processes, Proposes Transistor-density Metric
U.S. House Voted Against Broadband Privacy Rules
SK Hynix Offers More Than $9 billion for Toshiba Chip Unit: report
Toshiba's Nuclear Unit Westinghouse Files for Bankruptcy
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Microso...
Last 7 Days News : SU MO TU WE TH FR SA All News

Sunday, December 30, 2012
Microsoft Confirms Zero-day Bug in Internet Explorer Browsers


Microsoft on Saturday confirmed that Internet Explorer (IE) 6, 7 and 8 contain an unpatched bug that is being used by attackers to hijack victims' Windows computers.

The company said it was investigating the reports of the vulnerability in the specific browsers. Internet Explorer 9 and Internet Explorer 10 are not affected by the vulnerability, the company said. Microsoft is also aware of targeted attacks that attempt to exploit the vulnerability through Internet Explorer 8.

According to multiple security firms, the vulnerability was used by hackers to exploit Windows PCs whose owners visited the website of the Council on Foreign Relations (CFR), a non-partisan foreign policy think tank with offices in New York and Washington, D.C.

Other researchers claimed that attacks using the IE vulnerability started as early as Dec. 7, and alleged that Chinese hackers were responsible for the CFR website hack.

The vulnerability is a remote code execution vulnerability that exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. According to Microsoft, the vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

On completion of this investigation, Microsoft will provide a solution through its monthly security update release process, or an out-of-cycle security update.

Microsoft's engineers have also released a preliminary workaround that will protect affected IE customers until the update is ready.


Previous
Next
LG Teases With Smarter TV Lineup at CES        All News        Intel Rumored To Launch Internet TV Service
Facebook Fixes Privacy Flaw     General Computing News      DoJ Inverstigates Autonomy Case, HP says

Get RSS feed Easy Print E-Mail this Message

Related News
Microsoft Announces Patent License Agreement with Toyota
Adobe, Microsoft To Offer Solutions That Share Sales Data
Microsoft and Steelcase Present Concepts For The Future Workplace
Microsoft's Outlook.com Premium Emal Service Now Available
Microsoft To Give A Face Lifting To Windows 10 With 'Project NEON'
Microsoft Edge Will Soon Get New Features
Cloud Services Boost Microsoft's Sales And Profit
Microsoft Announces Intune for Education And New Windows 10 PCs for School
Microsoft, NXP Semiconductors, IAV and Auto Mobility Partners showcase Technologies For Safe And Personalized Automated Friving at CES 2017
Microsoft Partners with TomTom Mapping Company On Azure
European Commission Approves Acquisition of LinkedIn by Microsoft, Subject to Conditions
Microsoft Is Careful With New Chatbot Zo, Now Available For Testing

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .