Feeds

Friends don't let friends use Internet Explorer – advice from US, UK, EU

IE 6 to 11 at risk of hijacking, patch coming – but not for XP

Boost IT visibility and business value

Microsoft has warned of a new security flaw in all versions of its Internet Explorer web browser for Windows PCs. A patch has yet to be released for the crocked code.

Vulnerability CVE-2014-1776, to give the problem its formal name, allows miscreants to hijack at-risk Windows computers. It's all due to “the way Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated”, the software giant explained on Saturday.

The flaw means the browser “may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer".

"Microsoft is aware of limited, targeted attacks that attempt to exploit [this] vulnerability in Internet Explorer," the software giant added.

"An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.”

Internet Explorer 6 through 11 are all at risk, on all current versions of Windows from Vista to 8 and Windows Server 2003 to 2012 R2. The bug is understood to be present in IE on Windows XP, although that operating system is no longer supported.

Redmond's recommended reaction to the problem is to deploy version 4.1 of The Enhanced Mitigation Experience Toolkit (EMET), as that software “helps mitigate the exploitation of this vulnerability by adding additional protection layers that make the vulnerability harder to exploit.”

The US Homeland Security's Computer Emergency Readiness Team (CERT) has urged "users and administrators enable Microsoft EMET where possible and consider employing an alternative web browser until an official update is available". The UK CERT suggests using Google Chrome, Mozilla Firefox or another browser.

Even the European Union Agency for Network and Information Security (ENISA), has weighed in with a recommendation that "Users who want to avoid the abovementioned risk should temporarily use another browser until this security gap has been fixed."

Microsoft suggests a few other workarounds, such as switching on IE's Enhanced Protected Mode or setting security levels to “High” to stop ActiveX controls and Active Scripting working.

The upside, if there is any, is that Windows Server's default settings make it hard to create the kind of honeypot website that could exploit this flaw.

Microsoft has not said when a patch will arrive, but has hat-tipped FireEye for helping it to find the flaw. The security biz described the bug as a use-after-free blunder. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?