New Internet Explorer holes causing alarm

Four new holes have been discovered in the Internet Explorer (IE) Web browser that could allow malicious hackers to run attack code on Windows systems, even if those systems have installed the latest software patches from the Redmond, Wash. company, security experts warn.

Some of the new flaws are already being used to attack Windows users and include a glitch that allows attackers to fake or “spoof” the address of a Web page, as well as vulnerabilities that enable malicious pages from the Internet to be handled by IE with very little scrutiny or security precautions.

A Microsoft spokesperson acknowledged the reports and said the company is looking into the attacks and is considering what steps to take, including the release of an emergency security patch to address the problems.

Word of the four new vulnerabilities surfaced in security discussion news groups in recent weeks. Two of the vulnerabilities, first disclosed by someone using the name Rafel Igvi and posted to the NTBugtraq discussion list, allows attackers to load content from malicious Web pages while displaying the Web address of legitimate sites in the Internet Explorer’s address bar. Attackers could trick users into clicking on the bogus Web links using e-mail messages or by linking from other Web pages.

The vulnerability is very similar to another hole that was uncovered in December 2003 that allowed attackers to hide the real location of a Web page by including the characters %01 before the @ symbol in a URL. The new vulnerability allows attackers to hide the actual address of the Web page that is being loaded by prefacing the address with the characters ::/ with some IE URLs, according to security company Secunia.

“Conceptually, it’s very similar to the %01 problem, and (the flaw) is in a related part of the Internet Explorer code,” said Thor Larholm, senior security researcher at PivX Solutions LLC.

Another unpatched hole, called a “cross zone scripting” vulnerability allows attackers to trick Internet Explorer into loading insecure content using relaxed security precautions typically applied to files stored on the local hard drive or obtained from a trusted Web site such as www.microsoft.com, Secunia said.

When combined, the address spoofing and cross zone scripting holes can create a potent and stealthy attack, with attackers using the spoofing hole to trick IE into thinking it is on a safe Web site, even as it loads malicious content from another part of the Internet, Larholm said.

“The address spoofing makes sure (the attacker) can load content from his site, and the cross zone scripting hole makes sure he can do it in (a trusted) security zone,” he said.

On Thursday, two more unpatched Internet Explorer holes also surfaced that are slight variations on the same themes. One is a spoofing vulnerability that works on IE, as well as the Mozilla and Safari browsers and allows attackers to fake the address displayed in the address bar. The other is a cross zone scripting hole that lets users load insecure Web pages as if they were trusted Web pages, Larholm said.

All the new holes are variations of flaws discovered in the last two years, and play on known weaknesses in Internet Explorer’s design, said Larholm.

In particular, Microsoft’s implementation of “security zones” into which Web pages can be grouped is deeply flawed, as is code in IE for assessing what level of security to apply to a particular Web page URL. Fixing such problems will demand a wholesale reengineering of the often-used Web browser, something Microsoft plans to do in the next major release of Windows, code named “Longhorn,” Larholm said.

In the meantime, Microsoft and others recommend following so-called “safe browsing” practices. Microsoft has a list of such practices on its Web page. Companies should consider increasing security in the Local Machine (or MyComputer) zone. Steps for doing so are also available on the Microsoft Web page.

PivX also offers Windows users a free tool, Qwik-Fix, that locks down Windows and prevents many common exploits, Larholm said.

Microsoft will work with law enforcement to prosecute individuals who use exploit code to damage computers, the spokesperson said.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now