Security analysts and vendors are reporting a flaw in Microsoft Corp.’s Internet Explorer browser that could allow malicious code to run and result in a hacker taking over complete control of a computer.
Microsoft was informed of a vulnerability with Explorer’s drag-and-drop function in August 2005 after it was first found by Matthew Murphy, Noam Rathaus, chief technical officer for Beyond Security Ltd. in Netanya, Israel, said Monday. The company, which helped Murphy report the flaw to Microsoft last year, runs an independent security site called SecuriTeam.
Websense Inc., which also issued a warning Monday, wrote that a specially crafted Web site could trick a user into dragging and dropping an item from one window to the other. After the user released the mouse in the newly focused window, code could run without consent, Websense said.
Microsoft said it wouldn’t issue an immediate patch, but will instead wait to issue a fix in Service Pack 2 for Windows Server 2003 and Windows XP Service Pack 3, Rathaus said. Microsoft officials were not immediately available for comment.
The SecuriTeam site went public with the vulnerability Monday after consulting Microsoft, Rathaus said. SecuriTeam detailed three methods to prevent the flaw from being exploited at this Web site.
SecuriTeam’s advisory criticized Microsoft’s decision not to issue a patch, saying the company’s “conclusion appears fundamentally inconsistent with the way related issues were handled by Microsoft.” Further, Websense said the vulnerability is not as easy to exploit as some others, but a risk remains.
“They [Microsoft] don’t see the issue being that important,” Rathaus said. “They are not going to fix it any time soon.”
As part of its monthly patch update, Microsoft plans to release seven fixes on Tuesday for Windows Media Player; Windows and Microsoft Office.