|
|
|
Let us know how to make ENN better!
Take our reader's survey.
|
|
|
|
|
|
|
Face-to-Face: Dinesh Dhamija, CEO Ebookers Don't look now, but e-travel is booming -- and strangely, its successes are coming only after the dot-bomb and September 11, events that decimated related industries. Matthew Clark spoke with Dinesh Dhamija, CEO of highflying European e-travel firms Ebookers, as the company considers acquisitions, market share and the future.
|
|
|
The following e-mail will be sent on your behalf.
has sent the following story to you from ElectricNews.net.
The story is available from https://electricnews.net/news.html?code=7439730
Kill the MSN Messenger
Thursday, May 09 2002
by The Register
Microsoft issued a "critical" security update after the discovery of a vulnerability that allows attackers to execute malicious code against MSN Messenger.
The problem stems from a flaw in an ActiveX control, called MSN Chat, which is included with MSN Messenger since version 4.5 and Exchange Instant Messenger, writes John Leyden.
MSN Chat allows groups of users to gather in a single, virtual location on-line to engage in text messaging.
Researchers at eEye Digital Security have HREF="http://www.eeye.com/html/Research/Advisories/AD20020508.html">discovered that an unchecked buffer exists in one of the functions that handles input parameters in the MSN Chat control. Because of this, users enticed to open a maliciously crafted HTML mail or visit a maliciously constructed Web site could potentially fall victim to an attack.
In mitigation, Microsoft says that Outlook Express 6.0 and the Outlook E-mail Security Update and can thwart such attacks through their default security settings. It also points out that the version of Windows Messenger which ships with Windows XP does not include the MSN Chat control.
This still leaves a vast number of people vulnerable (Outlook E-mail Security Update take-up is worryingly low) so it is not without good reason that Microsoft defines the update as "critical." The vulnerability is ripe for exploitation and of a type that means it is likely to hang around for some time before people wake up to the problem.
Buffer overflows are a common class of security vulnerability, associated with sloppy programming, which allow arbitrary and potentially malicious code to be injected into a system through a carefully crafted, malformed data entry.
Generally, this spurious input is much longer than a program expects, causing code to overflow the buffer, crash a process and enter parts of a system where it may be subsequently executed.
More information and patch for the vulnerability can be found on HREF="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-022.asp">the Microsoft Web site.
The Register and its contents are copyright 2002 Situation Publishing. Reprinted with permission.
|
|
|
|