UniBrows Adds Security To Internet Explorer 6 Apps
Startup Browsium could help eliminate security concerns for firms that don't have the budget to update their IE6-based apps or intranets for safer browsers.
If breaking up with Internet Explorer 6 is hard to do, Browsium, a new software startup created by former Microsoft employees, may have the solution: run IE6 inside Internet Explorer 8.
More Security Insights
- How Attackers Identify and Exploit Software and Network Vulnerabilities
- Cloud Security: It’s Not Just for IT Anymore
- Case Study: LivePerson Secures Robust Static Code Analysis Security Solution
- Advanced Protection Against Advanced Threats
But the biggest upside may be as a way to eliminate IE6's well-documented security flaws.
As Graham Cluley, senior technology consultant at Sophos, has said: "Microsoft itself has urged IE6 users to upgrade to Internet Explorer 8 (as a way of avoiding an attack by a zero-day vulnerability). And yet... plenty of firms and organizations find themselves still running Internet Explorer 6."
Indeed, according to Net Applications, IE6 still accounts for 15% of the world's browser use. But for organizations that rely on custom applications or intranets that only work with IE6, and which don't have budgetary approval to rewrite them for IE8, what's the near-term alternative?
According to Matt Heller, CEO of Browsium, "IE6 is clearly less secure than IE8, so running IE6 standalone, virtualized, or in an IE tab increases the attack surface of a system -- this is clearly unavoidable."
But his company's UniBrows, he said, "offers mitigations that counteract the increased risk of running IE6, something that standalone IE and virtualized solutions do not." For example, UniBrows enables IE6 applications to be administered with Microsoft Management Console, and access to the applications can be managed via Group Policy.
Further security protections are added by a UniBrows plug-in that sits between the IE6 engine and web pages, which watches for suspect behavior, such as "loading an IFRAME, sending content across domains, and installing ActiveX controls," said Heller. Non-permitted activities get blocked outright, or in the case of ActiveX controls, passed to the IE8 security engine for handling.
The plug-in is opt-in by default and granular -- down to individual page behavior -- meaning that attackers can't switch on the rendering engine to then remotely attack IE6. "By enforcing the rules as we do, sites can only render using the IE6 functionality when manually configured by the organization. Unlike Google Chrome Frame or similar solutions, there is no ability for the remote site to trigger the rendering switch," said Heller.
This approach also curtails attacks that attempt to exploit known IE6 vulnerabilities. For example, if an attacker uses a known IE6 bug to attempt to trigger a buffer overflow and then execute arbitrary code -- such as deleting all files on the home drive -- "our process makes the control think that the command was successful when, in fact, nothing really happened," he said.
Browsium hopes to publicly release UniBrows later this month.
Our trending survey shows that IT pros have warmed considerably to Windows 7. Now the trick is selling an upgrade to the business, ensuring app and hardware compatibility, and easing users off XP with minimal heartache. Here's how. Download the report here (registration required).