1. Hey Guest Did you know you can win an Honor 10 phone worth ₹33,000 and an additional ₹70,000 in paytm vouchers, just by replying to some threads and taking part in the discussions happening in the Honor Hub?

    What are you waiting for? Start commenting and start winning! Remember to read the instructions posted here.

    Dismiss Notice

Microsoft Confirms 'Highly Critical' IE Hole!!

Discussion in 'Technology News' started by naveenchandran, Mar 24, 2006.

Thread Status:
Not open for further replies.
  1. naveenchandran

    naveenchandran New Member

    Joined:
    May 16, 2004
    Messages:
    451
    Likes Received:
    0
    Trophy Points:
    0
    Location:
    ** Hosur ** Operating System:GNU
    Microsoft plans to release a pre-patch advisory with workarounds for a "highly critical" vulnerability that could put millions of Internet Explorer users at the mercy of malicious hackers. :|

    http://blogs.technet.com/msrc/default.aspx

    The advisory, which will be posted here, acknowledges a code execution hole that was discovered and publicly reported by Secunia Research of Copenhagen, Denmark.

    Secunia said in an alert that the vulnerability is due to an error in the processing of the "createTextRange()" method call applied on a radio button control.

    "This can be exploited by a malicious Web site to corrupt memory in a way that allows the program flow to be redirected to the heap," Secunia said in the alert, warning that successful exploitation allows execution of arbitrary code whenever the target visits the rigged Web site.

    The vulnerability was confirmed on a fully patched system with IE 6.0 and Microsoft Windows XP SP2. It has also been confirmed in IE 7 Beta 2 Preview, Secunia said.

    The MSRC (Microsoft Security Response Center) said in a blog entry that users of the new refresh of the IE7 Beta 2 Preview announced at Mix '06 are not affected.



    Lennart Wistrand, a program manager in the MSRC, recommended that IE users turn off Active Scripting to prevent a possible attack.

    "Customers who use supported versions of Outlook or Outlook Express aren't at risk from the e-mail vector since script doesn't render in mail [being read in the restricted sites zone]," Wistrand added.

    The latest warning comes just 24 hours after the discovery, and public release, of a denial-of-service bug in the dominant Web browser.

    Sources:

    http://www.eweek.com/article2/0,1895,1940501,00.asp
    http://www.pcmag.com/article2/0,1895,1941724,00.asp
    http://www.computerworld.com/softwaretopics/software/story/0,10801,109861,00.html
    http://www.technologyreview.com/blogs/Wade_Roush/wtr_16628,292,p1.html?CMT=1
    http://news.com.com/Dangerous+code+on+Net+could+be+used+to+exploit+IE+hole/2100-1002_3-6053456.html
     
  2. RCuber

    RCuber The Mighty Unkel!!! Staff Member

    Joined:
    Sep 7, 2004
    Messages:
    7,105
    Likes Received:
    12
    Trophy Points:
    38
    Location:
    ಬೆಂಗಳೂರು (Bengaluru)
    Hmm i dont use IE. But i will have to patch it once the patch is available. :roll:
     
Thread Status:
Not open for further replies.

Share This Page