Feeds

MS mulls emergency IE fix

Out-of-band

Secure remote control for conventional and virtual desktops

Microsoft is considering plans to release an unscheduled security patch to address a serious security vulnerability in its ubiquitous Internet Explorer web browser.

Malicious hackers are taking advantage of a security bug in the Vector Markup Language (VML) component of IE to infect users visiting specific pornographic, or other maliciously constructed websites.

Opening maliciously constructed emails in Outlook is also a potential risk, especially as attacks targeting the vulnerability are growing in prevalence since their first appearance last week.

Security firms report the increased prevalence of mass mailing lures that attempt to direct surfers to websites hosting VML exploit code, using tricks such as claiming users have received a Yahoo! Greeting Card.

Microsoft, contrary to reports from independent security experts such as the SANS Institute, claims that these attacks remain "limited". But it concedes this situation could change at any time.

In response, Microsoft is pushing hard to develop and test a stable security patch. This patch is nearing sign-off and may be ready for release outside Microsoft's regular Patch Tuesday update cycle, a rare but far from unprecedented move. Microsoft's next Patch Tuesday is due on 10 October, but the IE patch is likely to appear before that, if a posting on Microsoft's Security Response blog is anything to go by.

"We've made some progress in our testing pass for the update and are now evaluating releasing this outside the monthly cycle, as we do any time customers are under threat and we believe we can issue an update that meets our quality bar for widespread deployment. So right now we're looking at where we hit that quality bar and if that occurs prior to the monthly cycle then we will release," writes Microsoft's Scott Deacon. "The primary driver here is quality and protecting customers, not adherence to the monthly schedule."

News of the possibility of an official IE patch from Microsoft comes days after the release of an unofficial patch from a new ad-hoc group of security pros, called the Zeroday Emergency Response Team (ZERT). Microsoft said it welcomes this work, but does not endorse third party updates on general principle. "As a best practice, customers should obtain security updates and guidance from the original software vendor," Deacon writes.

The VML security bug is unrelated to a (still unpatched) flaw in Microsoft's Direct Animation Path (daxctle.ocx) ActiveX control discovered earlier this month. It's unclear when Microsoft will fix this bug and a patch for this may, or may not, come later than that for the VML bug. ®

Remote control for virtualized desktops

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.