Feeds

MS mulls emergency IE fix

Out-of-band

Next gen security for virtualised datacentres

Microsoft is considering plans to release an unscheduled security patch to address a serious security vulnerability in its ubiquitous Internet Explorer web browser.

Malicious hackers are taking advantage of a security bug in the Vector Markup Language (VML) component of IE to infect users visiting specific pornographic, or other maliciously constructed websites.

Opening maliciously constructed emails in Outlook is also a potential risk, especially as attacks targeting the vulnerability are growing in prevalence since their first appearance last week.

Security firms report the increased prevalence of mass mailing lures that attempt to direct surfers to websites hosting VML exploit code, using tricks such as claiming users have received a Yahoo! Greeting Card.

Microsoft, contrary to reports from independent security experts such as the SANS Institute, claims that these attacks remain "limited". But it concedes this situation could change at any time.

In response, Microsoft is pushing hard to develop and test a stable security patch. This patch is nearing sign-off and may be ready for release outside Microsoft's regular Patch Tuesday update cycle, a rare but far from unprecedented move. Microsoft's next Patch Tuesday is due on 10 October, but the IE patch is likely to appear before that, if a posting on Microsoft's Security Response blog is anything to go by.

"We've made some progress in our testing pass for the update and are now evaluating releasing this outside the monthly cycle, as we do any time customers are under threat and we believe we can issue an update that meets our quality bar for widespread deployment. So right now we're looking at where we hit that quality bar and if that occurs prior to the monthly cycle then we will release," writes Microsoft's Scott Deacon. "The primary driver here is quality and protecting customers, not adherence to the monthly schedule."

News of the possibility of an official IE patch from Microsoft comes days after the release of an unofficial patch from a new ad-hoc group of security pros, called the Zeroday Emergency Response Team (ZERT). Microsoft said it welcomes this work, but does not endorse third party updates on general principle. "As a best practice, customers should obtain security updates and guidance from the original software vendor," Deacon writes.

The VML security bug is unrelated to a (still unpatched) flaw in Microsoft's Direct Animation Path (daxctle.ocx) ActiveX control discovered earlier this month. It's unclear when Microsoft will fix this bug and a patch for this may, or may not, come later than that for the VML bug. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.