Microsoft fixes critical IE flaw

Microsoft Corp. has now fixed a widely reported flaw in its Internet Explorer (IE) browser that had been used by attackers over the past few weeks to take over the PCs of unsuspecting users. The flaw was one of four IE bugs fixed Tuesday in Microsoft’s regularly scheduled software update.

Although attacks based on the vulnerability have not been widespread, it is important that IE users now install the patch, said Neel Mehta, team lead of Internet Security Systems Inc.’s X-Force group. “It’s not of epic proportions,” he said. “But isolated attackers here and there have used it to install malware.”

Security experts had known about the flaw since May, but on Nov. 21 hackers with a U.K. organization called Computer Terrorism Ltd. posted sample code that showed it to be much more serious than originally thought. Within days that sample code was adapted and being used by attackers, prompting many security experts to erroneously predict that Microsoft would rush a patch ahead of its December update.

The bug concerns the way IE processes the “Window()” function in JavaScript, a popular scripting language used by Web developers to make their sites more dynamic. It affects IE users on Windows XP, Windows 2000 and Windows 98. In order to exploit this problem, attackers must first trick users into visiting a maliciously encoded Web site, which has helped prevent the bug from being more widely used.

Microsoft fixed this problem, along with the other three IE bugs, in one of two security updates, released Tuesday. More details on the IE fixes can be found in the MS05-054 Security Bulletin . This update is rated “critical” by Microsoft.

A second update, assigned Microsoft’s less severe security rating of “important,” fixes a problem in the Windows 2000 kernel. That update can be found at this Web site . This bug could help an attacker to circumvent Microsoft’s user privileges mechanism and perform unauthorized tasks on a PC.

Typically, this flaw could not be exploited remotely, as it requires that the attacker gain access to the targeted computer’s keyboard, said Steve Manzuik, security product manager with the company that discovered the bug, eEye Digital Security Inc. Its advisory is at thisWeb site.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now