ENN - Electric News.net
Free e-mail alerts & newsletter - Sign up here
Free e-mail alerts & newsletter - Sign up here
Edit your alerts
News
   CORRECTIONS
Survey
Let us know how to make ENN better!
Take our reader's survey.
Adworld

Face-to-Face: Dinesh Dhamija, CEO Ebookers
Don't look now, but e-travel is booming -- and strangely, its successes are coming only after the dot-bomb and September 11, events that decimated related industries. Matthew Clark spoke with Dinesh Dhamija, CEO of highflying European e-travel firms Ebookers, as the company considers acquisitions, market share and the future.
More here

 

The following e-mail will be sent on your behalf.

 has sent the following story to you from ElectricNews.net.

The story is available from https://electricnews.net/news.html?code=7532274

Microsoft patches more IE security gaps
Friday, May 17 2002
by The Register


Microsoft released another cumulative patch for Internet Explorer, which promises
to plug six recently discovered security defects involving the browser. The patch, for Internet Explorer 5.01, 5.5 and 6.0, includes the functionality of
previously released fixes, as well as tackling the new problems -- the most
serious of which could allow an attacker to run code of his choice on a victim's
machine. Microsoft describes the patch as 'critical', writes John Leyden.



Six of the worst


The most serious bug involves a cross-site scripting vulnerability. IE ships with
several files that contain HTML on the local file system, one of which contains a
flaw that could allow a script to execute as if it were run by the user. This bug
could be exploited by an attacker who tricks victims into either visiting a
maliciously constructed Web page or opening HTML e-mail containing a poisoned
script.


Next up us is an information disclosure vulnerability related to a buggy HTML
object, which is designed to provide support for Cascading Style Sheets. Because
of the bug, an attacker might be able to read, but not delete or change, data on
a local system, Microsoft says.


Moving on, there is an information disclosure vulnerability involving to the
handling of script within cookies, which could potentially allow one site to read
the cookies of another.


Also, there's a zone spoofing vulnerability that could allow a Web page to be
incorrectly reckoned to be in the Intranet zone or, in some very rare cases, in
the Trusted Sites zone.


Finally there are two variants of a 'content disposition' vulnerability, which
relate to how IE handles downloads when a downloadable file's Content-Disposition
and Content-Type headers are intentionally malformed. Virus writers might use the
technique to disguise the fact that an attachment contains executable content,
hence the need for the patch.


As well as plugging up the six vulnerabilities listed above, Microsoft's patch
also disables frames in the Restricted Sites zone. The change means that recently
released Microsoft e-mail clients (and those with Outlook E-mail Security Update
installed) will disable frames in HTML e-mail by default, blocking the
possibility of an HTML e-mail automatically opening a new window or launching the
download of an executable. At least that's the idea.


Users can read about the problems in more detail, and get links to the relevant
patch, in Microsoft's HREF="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-023.asp">advisory
on the subject.


The Register and its contents are
copyright 2002 Situation Publishing. Reprinted with permission.




Search

Jobs
ENN Corporate Services Ad Red Moon Media Ad ENN Message Boards House Ad
Powered by The CIA
Designed by Redmoon media

 

© Copyright ElectricNews.Net Ltd 1999-2002.