Sunday, November 22, 2009

IE6 and IE7 0-Day Reported

Via SANS ISC -

According to VUPEN security:

A vulnerability has been identified in Microsoft Internet Explorer, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a dangling pointer in the Microsoft HTML Viewer (mshtml.dll) when retrieving certain CSS/STYLE objects via the "getElementsByTagName()" method, which could allow attackers to crash an affected browser or execute arbitrary code by tricking a user into visiting a malicious web page.

We have not verified this claim, but would like to know if any of our readers have. Please use our contact form to reply, or add your comments below.

Jack wrote to tell us that Symantec has verified the bug:

November 21, 2009 - "A new exploit targeting Internet Explorer was published to the BugTraq mailing list yesterday. Symantec has conducted further tests and confirmed that it affects Internet Explorer versions 6 and 7 as well. The exploit currently exhibits signs of poor reliability, but we expect that a fully-functional reliable exploit will be available in the near future... To minimize the chances of being affected by this issue, Internet Explorer users should ensure their antivirus definitions are up to date, disable JavaScript and only visit Web sites they trust until fixes are available from Microsoft."

-------------------

While the bug above doesn't seem to affect IE8, it isn't out of the woods....The Register UK reported this week that IE8 had a bug that allows the exploitition of XSS vulnerabilities in safe websites.

1 comment:

  1. http://ipolicynetworks.com/technology/files/Microsoft_Internet_Explorer_Denial_of_Service_Vulnerability.html

    ReplyDelete