Feeds

MS issues monster IE security fix

One-stop patching

  • alert
  • submit to reddit

Remote control for virtualized desktops

A total of six new security stuff-ups affecting Internet Explorer and Outlook Express have been addressed in a cumulative patch which has made two temporary appearances on the TechNet Web site since last week.

This, the third posting, has been up for several hours, so we're going to take a chance and assume it works properly.

The patch addresses a serious buffer overflow vulnerability which can give an attacker total control of a victim's machine; a vulnerability allowing an attacker to view files on the victim's local drive; an HTML header manipulation vulnerability allowing an attacker to feed an executable file to a victim while causing it to appear to be a harmless text file; another header manipulation vulnerability which allows an attacker to invoke applications on the victim's system; a permission vulnerability allowing an attacker to run scripts even if the victim has scripting disabled; and the Document.Open() vulnerability which enables MSN and Windows Messenger to be hijacked, as we reported here.

Microsoft neglects to acknowledge the Messenger vulnerability, and says simply that the Document.Open() hole "could only be used to read files - not create, change, delete, or execute them."

Interestingly, the company acknowledges only two of the four contributors to its dramatically improved browser, presumably because it disapproves of the way in which some people choose to disclose their findings. Too proud to say thank you, but by no means too proud to profit from the work of others, MS has issued this advisory, with links to the patches for several different browser versions. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.