Microsoft plugs six more IE security holes

Microsoft Corp. has released a patch that addresses six security vulnerabilities in its Internet Explorer browser, including a critical flaw that could allow an attacker to run code on a client machine. The patch is intended for Internet Explorer 5.01, Internet Explorer 5.5 and Internet Explorer 6.0.

Among the changes that are provided by the patch is a fix that closes a vulnerability in one of Internet Explorer’s local HTML (Hypertext Markup Language) resources. One of the HTML files shipped with Internet Explorer contains a cross-site scripting vulnerability that could allow an attacker to execute a script on a user’s computer, Microsoft said in a security bulletin issued Wednesday.

The patch also addresses two information disclosure vulnerabilities that could allow an attacker to read, but not add, delete or change, data on a user’s computer. Both the cross-site scripting vulnerability and the information disclosure vulnerabilities were rated as critical flaws by Microsoft.

The patch also fixes a zone spoofing vulnerability that could allow a Web page to be viewed in Internet Explorer’s Trusted Sites zone, allowing an attacker’s Web page to be viewed with fewer security restrictions on a user’s PC.

The final vulnerabilities that the patch fixes are two content disposition vulnerabilities that could allow an attacker to fool Internet Explorer into thinking a malicious download is safe. These vulnerabilities were rated “low” to “moderate” by Microsoft.

Besides the six vulnerabilities described by Microsoft, the patch also disables frames in Internet Explorer’s Restricted Sites zone. As Outlook Express 6.0, Outlook 98 and Outlook 2000 with the Outlook Email Security Update and Outlook 2002 read email in the Restricted Sites zone by default, this change also disables frames in HTML e-mail that is read using any of these applications.

The change was made to eliminate the possibility that an HTML e-mail could automatically open a new window or download an executable file, Microsoft said.

The patch is available for download from Microsoft’s Web site: http://www.microsoft.com/windows/ie/downloads/critical/q321232/default.asp

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Previous article
Next article

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now