Feeds

MS plugs IE phishing bug

Breaks monthly cycle

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Microsoft has broken its monthly release cycle to issue a cumulative patch designed to address three potentially serious security vulnerabilities.

The company has dropped support for a common Web authentication method to fix a flaw which made it easier to lure IE users to malicious constructed or fraudulent sites.

Support is removed for handling user names and passwords in HTTP or HTTPS URLs in IE.

The syntax http(s)://username:password@server/resource.ext has legitimate users but is also frequently used in phishing scams.

The problem is compounded by a security vulnerability, resolved with yesterday’s cumulative update, which could be exploited to display a fake URL in the address and status bars of IE.

Rather than fix that specific flaw, which first emerged almost two months ago, Microsoft is ditching an entire approach. Microsoft alerted developers that it was contemplating the change last week.

Good riddance to bad coding

Reg reader response since has fallen into two camps: those who think the use of user names and passwords in HTTP should never have been supported; and others who think a pop-up dialogue box should be generated when URLs containing authentication tokens are used.

This would take the form: "Warning: You are about to go to xyz.com. Please check this address carefully to make sure that it is the site you were expecting to visit."

And another (two) things...

The cumulative patch - critical for IE 5.01, 5.5 and 6.0 users - also contains fixes for two other security vulnerabilities.

These involve an Internet Explorer File Download Extension Spoofing flaw and a Cross Site Scripting vulnerability, as explained in greater depth here.

Although Microsoft made a decision to release patches on a monthly basis last October it always retained the option of releasing urgent fixes on an ad-hoc basis.

Concern that the 'faking it' flaw - which emerged in early December - could aid the cause of fraudsters has driven the issue further up Microsoft's security agenda. A fix for the flaw was not released earlier in order to allow testing, Stuart Okin, Chief Security Officer at Microsoft UK, recently told El Reg. The phishing problem is much bigger an issue than an IE flaw which might allow a fake URL to be displayed in the address and status bars of visiting Web surfers, he said.

Too serious to wait

Microsoft went to monthly updates with the idea that if the release of fixes was more predictable more companies would get into the habit of consistently applying patches. Failure to apply patches is a major cause of corporate insecurity.

Critics might say Microsoft is releasing its fix - which it admits it critical - in a way that (by its own logic) means the patch is less likely to be rapidly applied.

It's all a bit of a mess and reason enough for some to consider using alternative browsers, though we can't see much of a stampede in that direction anytime soon.

In the meantime, IE users are urged to review Microsoft's patch here. ®

Related Stories

MS drop authentication technique to foil phishing
No relief from Microsoft phishing bug
IE phishing scam exploit unearthed
Gone Phishin'
Halifax suspends e-banking site after phishing attack
UK banks and police proffer anti-phishing advice
Ballmer's new MS security fix - same patches, but 'nicer'

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.