Feeds

MS plugs IE phishing bug

Breaks monthly cycle

  • alert
  • submit to reddit

High performance access to file storage

Microsoft has broken its monthly release cycle to issue a cumulative patch designed to address three potentially serious security vulnerabilities.

The company has dropped support for a common Web authentication method to fix a flaw which made it easier to lure IE users to malicious constructed or fraudulent sites.

Support is removed for handling user names and passwords in HTTP or HTTPS URLs in IE.

The syntax http(s)://username:password@server/resource.ext has legitimate users but is also frequently used in phishing scams.

The problem is compounded by a security vulnerability, resolved with yesterday’s cumulative update, which could be exploited to display a fake URL in the address and status bars of IE.

Rather than fix that specific flaw, which first emerged almost two months ago, Microsoft is ditching an entire approach. Microsoft alerted developers that it was contemplating the change last week.

Good riddance to bad coding

Reg reader response since has fallen into two camps: those who think the use of user names and passwords in HTTP should never have been supported; and others who think a pop-up dialogue box should be generated when URLs containing authentication tokens are used.

This would take the form: "Warning: You are about to go to xyz.com. Please check this address carefully to make sure that it is the site you were expecting to visit."

And another (two) things...

The cumulative patch - critical for IE 5.01, 5.5 and 6.0 users - also contains fixes for two other security vulnerabilities.

These involve an Internet Explorer File Download Extension Spoofing flaw and a Cross Site Scripting vulnerability, as explained in greater depth here.

Although Microsoft made a decision to release patches on a monthly basis last October it always retained the option of releasing urgent fixes on an ad-hoc basis.

Concern that the 'faking it' flaw - which emerged in early December - could aid the cause of fraudsters has driven the issue further up Microsoft's security agenda. A fix for the flaw was not released earlier in order to allow testing, Stuart Okin, Chief Security Officer at Microsoft UK, recently told El Reg. The phishing problem is much bigger an issue than an IE flaw which might allow a fake URL to be displayed in the address and status bars of visiting Web surfers, he said.

Too serious to wait

Microsoft went to monthly updates with the idea that if the release of fixes was more predictable more companies would get into the habit of consistently applying patches. Failure to apply patches is a major cause of corporate insecurity.

Critics might say Microsoft is releasing its fix - which it admits it critical - in a way that (by its own logic) means the patch is less likely to be rapidly applied.

It's all a bit of a mess and reason enough for some to consider using alternative browsers, though we can't see much of a stampede in that direction anytime soon.

In the meantime, IE users are urged to review Microsoft's patch here. ®

Related Stories

MS drop authentication technique to foil phishing
No relief from Microsoft phishing bug
IE phishing scam exploit unearthed
Gone Phishin'
Halifax suspends e-banking site after phishing attack
UK banks and police proffer anti-phishing advice
Ballmer's new MS security fix - same patches, but 'nicer'

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.