IE flaw lets hackers take over user’s computer

Microsoft Corp. said Thursday it has discovered and created a patch for a new Internet Explorer (IE) vulnerability that could allow hackers to run a program of their choice on another user’s machine.

The program could then allow the attacker to take control of the user’s machine and add, change or erase data, communicate with Web sites or reformat the machine’s hard drive, Microsoft said in a security bulletin.

The vulnerability is caused by HTML-based e-mail that contains an executable attachment whose MIME (Multipurpose Internet Mail Extensions) is incorrectly given as one of several unusual types. The flaw in IE will cause the attachment to be executed without displaying a warning, Microsoft said. MIME is an Internet standard for encoding binary files as e-mail attachments.

The versions of IE affected are 5.01 and 5.5. These versions of the browser are not capable of handling the unusual MIME types and automatically execute the attachment without alerting the user, Microsoft said. IE should only open files if the user explicitly asks for them to be opened. However, the flaw allows an attacker to circumvent this security measure, the Redmond, Washington-based company said. By default, IE downloads files automatically.

An attacker could exploit the vulnerability in one of two ways, according to Microsoft. The attacker could host the HTML e-mail on his or her Web site and try to persuade the user to visit it or the attacker could send the e-mail directly to the user, Microsoft said.

Microsoft already has created a patch for the IE vulnerability, which was brought to the company’s attention by Juan Carlos Cuartango, a telecommunications engineer with Kriptopolis, a Spanish online magazine that focuses on Internet cryptography, security and privacy. The patch prevents e-mails from automatically launching executable attachments, Microsoft said.

Russ Cooper, an analyst at TruSecure Corp. in Reston, Virginia, was unaware of the vulnerability but said there have been similar problems with MIME before. One was discovered in 1997 in the MIME header that allowed for a buffer overrun, he said. This would allow a hacker to run embedded malicious code in an e-mail and have it be executed when read. This affected both Microsoft Outlook and Netscape Communications Corp.’s Communicator. Another MIME vulnerability was also identified in late 2000, he said.

Microsoft’s security bulletin can be read at

http://www.microsoft.com/technet/security/bulletin/ms01-020.asp

. Kriptopolis, in Cantabria, Spain, can be reached at http://www.kriptopolis.com/.

Microsoft, based in Redmond, Wash., can be reached at http://www.microsoft.com/.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now