Feeds

Microsoft's IE 8 puts giant web hole on notice

Tell us if you've heard this one before?

Next gen security for virtualised datacentres

Engineers in Microsoft's Internet Explorer group are devising a new means to stamp out one of the web's biggest security banes: attacks that steal email, bank account credentials and other sensitive information by injecting malicious code into trusted websites.

Some of the web's biggest names - including Google, Yahoo and MySpace - have fallen victim to so-called cross-site scripting (XSS) attacks. Tens of thousands of other sites, some belonging to banks and health care providers, have also been been shown to be vulnerable. For the past few years, Firefox users have had the useful - but by no means perfect - NoScript plugin to insulate them, but currently no such protection exists for IE, which remains far and away the most popular browser.

That all will change with IE 8. Last month, Microsoft announced a new XSS filter that will be folded into the new browser. Microsoft earlier this week provided new details about its plans.

Specifically, engineers will take pains to ensure the XSS filter doesn't "break the web" by choking on false positives or slowing down the browsing experience. Cryptic error messages or dialog boxes are out. And so are overly aggressive filters that block legitimate sites or open users up to new types of attacks.

"It is challenging to mitigate XSS in a way that balances the needs of compatibility, security, and performance," David Ross, a Microsoft Security Vulnerability Research & Defense blogger writes.

To prevent performance bottlenecks, the filter only acts on web pages that can result in the execution of scripts, so objects such as images that don't include scripts are ignored. The filter also gives a green light to code that's found to originate from the site the user is visiting. The filter can also be disabled for specific zones, based on an administrator's preferences.

When the filter encounters a script that is hosted on a site other than the one being visited, a heuristics engine is started that inspects the URL and POST data of the requested page and uses regular expressions to identify possible XSS vulnerabilities. The filter scours the URL for suspicious characters such as script tags. When suspicious characters are found, the filter kicks into action by inspecting the HTTP code and generating a signature.

Signatures are then compared against the HTTP response and scripts found to be malicious are neutered. Instead of running the code, IE displays a message that says the page has been modified to prevent an XSS attack.

Rival security researchers have wasted no time in criticizing the approach. Giorgio Maone, the creator of NoScript, said the the filter is likely to miss many attacks because of the requirement that it check the HTTP responses for actual reflection. Attacks that use pure JavaScript or that don't fully echo back to a browser may not be flagged, he says.

"If you deploy a security feature already knowing how to work-around it, I think it's more security theater than anything else," he told The Reg in an email.

Maybe. But the filter does have its proponents, among them Dave Aitel, CTO of Immunity Security. Because IE compares a web request to the page that's returned, the filter ought to be able to make informed decisions about whether an attack is taking place.

"That's more aggressive than anyone else is being other than Firefox," he says.

Microsoft's blog post is here. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.