Posted on 03/27/2006 6:58:48 PM PST by Ernest_at_the_Beach
A dangerous new exploit in Internet Explorer could put PCs and data at risk, Microsoft has admitted.
The flaw, for which code has already been published on the internet, could be exploited to set an email-borne virus free on the unsuspecting public.
Potential viruses could come as an attachment that conceals the code, or could possibly redirect users to a site that will unleash the code on the user's machine, leaving the computer open to remote attack. Once the PC is being controlled by a malicious user, it can then be used to launch attacks on other PCs.
Even supposedly fully patched versions of Internet Explorer 6 are vulnerable to the flaw, it seems, as are users with XP Service Pack 2.
However, Microsoft has no plans to patch it until its next security update is released. This is despite some security companies rating it as a high level threat.
In a security advisory on its website, Microsoft outlined the threat: "We have seen examples of proof of concept code but we are not aware of attacks that try to use the reported vulnerabilities or of customer impact at this time.
"Microsoft has determined that an attacker who exploits this vulnerability would have no way to force users to visit a malicious website."
Instead, it has warned users of its browser products to be careful when opening email attachments and to avoid untrusted websites. It has also recommended that users disable Active Scripting in their browser in an attempt to reduce their exposure to attack.
The other option is to choose an alternative browser, such as Firefox or Opera. However, even these browsers are not as safe from attack as they were once considered.
Firefox has been subject to a number of flaws over the past year, including one that could leave its users more vulnerable to phishing scams. Meanwhile, a report published in September by Symantec rated Internet Explorer as safer than Firefox. The report found some 25 flaws in Mozilla's Firefox internet browser, almost double the number it discovered in IE.
However, it has been a tough week for Microsoft - this is the third security flaw it has had to investigate in the past seven days. On Tuesday, it admitted it was looking into a security flaw that could leave Windows PCs open to remote control, while earlier in the week it also alerted users to a vulnerability that could cause the Internet Explorer browser to crash.
**********************************
****************************************************************
News Story by Nancy Gohring
MARCH 27, 2006
So far, attacks are limited in scope, Stephen Toulouse, head of Microsoft's Security Response Center, wrote on the center's blog Saturday. Today, however, Web security company Websense Inc. said it has found hundreds of sites taking advantage of the weakness and that the number of such sites is rapidly growing.
The vulnerability, which was first identified last week, allows hackers to entice Web surfers to visit Web sites where malicious code can be automatically run on the visitor's computer (see "Exploit now publicly available for unpatched IE flaw"). It exploits a vulnerability in the way that IE renders HTML and affects Windows 2000, Windows XP and Windows Server 2003, Toulouse said. Users of IE 7 Beta 2, the most recent version of IE, won't be affected by the bug, Microsoft said.
"We're working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability," Toulouse wrote. The update is being tested and is expected to be released as part of Microsoft's monthly security update, which is scheduled for April 11, he said. However, Microsoft could release the fix earlier if the threat grows, he said.
The Web sites found by Websense download different types of malicious code, including back doors and Trojan horses, onto Web surfers' machines. Back doors bypass regular authentication requirements, enabling unauthorized access to computers, and Trojan horses are malicious programs disguised as legitimate applications.
Microsoft is working with industry partners and law enforcement to remove Web sites that are exploiting the vulnerability, Toulouse said.
Web surfers can avoid the attack by turning off Active Scripting, Microsoft said.
The vulnerability is the third such IE bug to surface within the past two weeks and is considered the most serious because it is relatively easy to exploit.
Does anybody in the whole world not know this?
I think there are many that are not well versed in the art of avoiding trouble on the internet!
I have no earthly .....how this happened...BUT, alot of my work involves email attaching (sending, mainly....NOT opening).
Might any kindly freepers help? Thank you in advance!
In what alternate universe are they living in?
What browser are you using?
IE
apparently, I'm close to "licking toads"? LOL
Have you got anti-spyware stuff installed?
Do you have a firewall , either hardware or software installed? My questions here are real basic, others here are much more knowledgeable about windows stuff.
Searching freerepubli9c for spyware will get you many threads with discussion although this might be a good one to start on:
Free website to list programs with spyware
backhoe always has some good suggestions.
Yes, Adaware & Spybot don't detect it, even a registered version of Webroot Spysweeper failed to detect it. AVG? nope. Panda & Housecall, the online scans, do not detect it.
Seems like I've got to do it manually, I think, via Hijack This!, but am leery of messin w/ da registry!
As an aside, many "free spyware scans" detect it....like "Spyware Doctor" BUT....yep, you already know what I'm gonna say, right? (thay want $$ to get rid of it). Sigh.
I'm going to try bit defender.....will let you know.
OK, so I see you are not a newbie to dealing with the crap.
Not sure I'll be of much help.
Well, if it works for you :-)
Sorry, but I can't help you with IE issues.
On the bright side, "about:blank" is probably the least offensive webpage you could have been redirected to!
Let us know how bit defender works and if you try Hijack This as well. I'm curious.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.