- Joined
- Jul 11, 2008
- Messages
- 5,769
- Points
- 48
![large.jpg](http://ivory.vnunet.com/images/microsoft/microsoft-bug/large.jpg)
http://www.vnunet.com/vnunet/news/2232591/ie-flaw-worse-originally
![medium.jpg](http://ivory.vnunet.com/images/microsoft/microsoft-bug/medium.jpg)
IE flaw worse than originally thought
More versions up for grabs
Written by Iain Thomson in San Francisco
vnunet.com, 13 Dec 2008
Microsoft has confirmed that it is not just Internet Explorer (IE) 7 that is vulnerable to a new zero day attack, but older versions of the browser too.
IE 5 and 6 have been confirmed as also vulnerable to the flaw which, when properly exploited, can allow a hacker to gain complete control of a vulnerable system.
“At this time, we are aware only of limited attacks that attempt to use this vulnerability against Windows Internet Explorer 7,” said the company in an advisory.
“Our investigation of these attacks so far has verified that they are not successful against customers who have applied the workarounds listed in this advisory. Additionally, there are mitigations that increase the difficulty of exploiting this vulnerability.”
The flaw targets a component in IE7 that handles XML tags. When the page confirms that the user is running a vulnerable browser and operating system, a specially crafted tag is loaded.
“Any security vendor basing their detection rules on the publicly available exploits is not detecting attacks fully,” said Carsten Eiram, chief security specialist at Secunia.
“Users should therefore not just browse around using their IE browser, thinking that they're safe. Setting the security level to "High" for the " Internet" security zone will somewhat protect you and combined with Microsoft's suggestions related to OLEDB32.DLL you should be able to keep your system to yourself.”
<hr width="50%">
http://www.vnunet.com/vnunet/news/2232403/ie-zero-day-emerges
- Where am I? >
- Home >
- News >
- Bugs & Fixes
![medium.jpg](http://ivory.vnunet.com/images/microsoft/microsoft-bug/medium.jpg)
<!-- -->
IE zero-day flaw under attack
Attack targets unpatched flaw in web browser
Written by Shaun Nichols in San Francisco
vnunet.com, 11 Dec 2008
A new attack targeting Internet Explorer 7 has been reported.
The attack is said to target an unpatched flaw in IE7 and is carried out by way of a specially-crafted XML file.
<!--Testing new ads format--><script language="JavaScript" type="text/javascript">//<!-- document.write('<script language="JavaScript" src="http://ad.uk.doubleclick.net/adj/vnu2.uk/nw_bugs-and-fixes__art;page=2232403;pos=1;tile=3;dcopt=ist;sz=336x280;ord=981973218?" type="text/javascript"></scr' + 'ipt>'); //--></script><script language="JavaScript" src="http://ad.uk.doubleclick.net/adj/vnu2.uk/nw_bugs-and-fixes__art;page=2232403;pos=1;tile=3;dcopt=ist;sz=336x280;ord=981973218?" type="text/javascript"></script>
![](https://m1.emea.2mdn.net/viewad/817-grey.gif)
<!--End test tag--> <script type="text/javascript" language="JavaScript"><!-- printAdvert("http://ad.uk.doubleclick.net/adj/vnu.uk/bugs-and-fixes;chan=news;sect=news;subsect=;topcat=security;cat=bugs-and-fixes;artid=2232403;page=article;tile=3;pos=top;sz=336x280"); //--></script><script language="JavaScript" src="http://ad.uk.doubleclick.net/adj/vnu.uk/bugs-and-fixes;chan=news;sect=news;subsect=;topcat=security;cat=bugs-and-fixes;artid=2232403;page=article;tile=3;pos=top;sz=336x280;ref=2232591;ord=3865435298?"></script><!-- Template Id = 1 Template Name = Banner Creative (Flash) --> <!-- Copyright 2002 DoubleClick Inc., All rights reserved. --><script src="http://m1.emea.2mdn.net/879366/flashwrite_1_2.js"></script> <noscript>
![336x280.gif](https://m1.emea.2mdn.net/1814773/336x280.gif)
According to Sans researcher Bojan Zdrnja, the exploit was not addressed by Tuesday's monthly security update and is believed to affect both Windows XP and Server 2003.
The researcher explained that the flaw targets a component in IE7 that handles XML tags. When the page confirms that the user is running a vulnerable browser and operating system, a specially crafted tag is loaded.
Zdrnja said that the attack is not believed to be widespread, but public exploit code has been made available. He also noted that a special feature of the attack, waiting six seconds to launch, could make the exploit even more potent.
"This was probably added to thwart automatic crawlers by anti-virus vendors, " Zdrnja said of the feature.
A Microsoft spokesperson told vnunet.com that the company is investigating reports of an Internet Explorer vulnerability.
If confirmed the IE flaw would be the second unpatched vulnerability to emerge for a Microsoft product this month. Attached to yesterday's security release was a note from the company that a flaw in Word 97 had yet to be patched as well.
Though the company prefers to release patches on a monthly basis to lighten the maintenance burden on administrators, special out-of-cycle updates are sometimes released when a high-risk or widespread security issue is reported.
![Eek :eek: :eek:](/styles/default/xenforo/smilies/eek.png)
![Eek :eek: :eek:](/styles/default/xenforo/smilies/eek.png)
![Eek :eek: :eek:](/styles/default/xenforo/smilies/eek.png)
![Mad :mad: :mad:](/styles/default/xenforo/smilies/mad.png)