Brief: IE Harbors Yet Another Bug - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
News
9/28/2006
04:53 PM
50%
50%

Brief: IE Harbors Yet Another Bug

The flaw is in an ActiveX control included with Windows 2000, Windows XP, and Windows Server and can be exploited to overflow Internet Explorer's buffer, then introduce malicious code to the compromised PC.

A working exploit against yet another unpatched bug in Internet Explorer has popped up, security researchers, including those at US-CERT, said Thursday.

The flaw is in an ActiveX control included with Windows 2000, Windows XP, and Windows Server, said Symantec. As with another still-unfixed vulnerability disclosed two weeks ago, the control -- WebViewFolderIcon -- can be exploited to overflow Internet Explorer's buffer, then introduce malicious code to the compromised PC. US-CERT, the federal cyber-alert agency, also issued a warning.

HD Moore of Metasploit first reported the vulnerability in July as part of his "Month of Browser Bug" project. Then, however, Moore's proof-of-concept code only demonstrated a denial-of-service that crashed the browser.

"Now that a functional exploit is available, an official patch from Microsoft will likely appear at some point in the future," Symantec said in an alert to customers.

That may be whistling in the dark, however, since Microsoft has several outstanding vulnerabilities to contend with, including the earlier ActiveX flaw and one publicized Wednesday in Microsoft Office's presentation software, PowerPoint.

Microsoft has not posted an advisory for the new flaw, and Symantec and US-CERT only suggested that users either disable Active Scripting in IE or set the "kill bit" for the ActiveX control. The latter, however, is somewhat technical and if done incorrectly, can damage the operating system.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
News
IT Spending Forecast: Unfortunately, It's Going to Hurt
Jessica Davis, Senior Editor, Enterprise Apps,  5/15/2020
Commentary
Helping Developers and Enterprises Answer the Skills Dilemma
Joao-Pierre S. Ruth, Senior Writer,  5/19/2020
Slideshows
Top 10 Programming Languages in Demand Right Now
Cynthia Harvey, Freelance Journalist, InformationWeek,  4/28/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll