Feeds

MS plugs IE phishing bug

Breaks monthly cycle

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Microsoft has broken its monthly release cycle to issue a cumulative patch designed to address three potentially serious security vulnerabilities.

The company has dropped support for a common Web authentication method to fix a flaw which made it easier to lure IE users to malicious constructed or fraudulent sites.

Support is removed for handling user names and passwords in HTTP or HTTPS URLs in IE.

The syntax http(s)://username:password@server/resource.ext has legitimate users but is also frequently used in phishing scams.

The problem is compounded by a security vulnerability, resolved with yesterday’s cumulative update, which could be exploited to display a fake URL in the address and status bars of IE.

Rather than fix that specific flaw, which first emerged almost two months ago, Microsoft is ditching an entire approach. Microsoft alerted developers that it was contemplating the change last week.

Good riddance to bad coding

Reg reader response since has fallen into two camps: those who think the use of user names and passwords in HTTP should never have been supported; and others who think a pop-up dialogue box should be generated when URLs containing authentication tokens are used.

This would take the form: "Warning: You are about to go to xyz.com. Please check this address carefully to make sure that it is the site you were expecting to visit."

And another (two) things...

The cumulative patch - critical for IE 5.01, 5.5 and 6.0 users - also contains fixes for two other security vulnerabilities.

These involve an Internet Explorer File Download Extension Spoofing flaw and a Cross Site Scripting vulnerability, as explained in greater depth here.

Although Microsoft made a decision to release patches on a monthly basis last October it always retained the option of releasing urgent fixes on an ad-hoc basis.

Concern that the 'faking it' flaw - which emerged in early December - could aid the cause of fraudsters has driven the issue further up Microsoft's security agenda. A fix for the flaw was not released earlier in order to allow testing, Stuart Okin, Chief Security Officer at Microsoft UK, recently told El Reg. The phishing problem is much bigger an issue than an IE flaw which might allow a fake URL to be displayed in the address and status bars of visiting Web surfers, he said.

Too serious to wait

Microsoft went to monthly updates with the idea that if the release of fixes was more predictable more companies would get into the habit of consistently applying patches. Failure to apply patches is a major cause of corporate insecurity.

Critics might say Microsoft is releasing its fix - which it admits it critical - in a way that (by its own logic) means the patch is less likely to be rapidly applied.

It's all a bit of a mess and reason enough for some to consider using alternative browsers, though we can't see much of a stampede in that direction anytime soon.

In the meantime, IE users are urged to review Microsoft's patch here. ®

Related Stories

MS drop authentication technique to foil phishing
No relief from Microsoft phishing bug
IE phishing scam exploit unearthed
Gone Phishin'
Halifax suspends e-banking site after phishing attack
UK banks and police proffer anti-phishing advice
Ballmer's new MS security fix - same patches, but 'nicer'

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.