Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 03/27/2006 6:58:50 PM PST by Ernest_at_the_Beach
[ Post Reply | Private Reply | View Replies ]


To: All
More:

**********************************

Update: Microsoft tests fix for IE bug as exploits appear
It aims to add patch on or before its April 11 security update

****************************************************************

News Story by Nancy Gohring

MARCH 27, 2006 - A recently identified security hole in the Internet Explorer browser is being exploited, and Microsoft Corp. hopes to include a fix for it in its April 11 patch or possibly sooner, according to a posting on a Microsoft blog.

So far, attacks are limited in scope, Stephen Toulouse, head of Microsoft's Security Response Center, wrote on the center's blog Saturday. Today, however, Web security company Websense Inc. said it has found hundreds of sites taking advantage of the weakness and that the number of such sites is rapidly growing.

The vulnerability, which was first identified last week, allows hackers to entice Web surfers to visit Web sites where malicious code can be automatically run on the visitor's computer (see "Exploit now publicly available for unpatched IE flaw"). It exploits a vulnerability in the way that IE renders HTML and affects Windows 2000, Windows XP and Windows Server 2003, Toulouse said. Users of IE 7 Beta 2, the most recent version of IE, won't be affected by the bug, Microsoft said.

"We're working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability," Toulouse wrote. The update is being tested and is expected to be released as part of Microsoft's monthly security update, which is scheduled for April 11, he said. However, Microsoft could release the fix earlier if the threat grows, he said.

The Web sites found by Websense download different types of malicious code, including back doors and Trojan horses, onto Web surfers' machines. Back doors bypass regular authentication requirements, enabling unauthorized access to computers, and Trojan horses are malicious programs disguised as legitimate applications.

Microsoft is working with industry partners and law enforcement to remove Web sites that are exploiting the vulnerability, Toulouse said.

Web surfers can avoid the attack by turning off Active Scripting, Microsoft said.

The vulnerability is the third such IE bug to surface within the past two weeks and is considered the most serious because it is relatively easy to exploit.

2 posted on 03/27/2006 7:03:09 PM PST by Ernest_at_the_Beach (History is soon Forgotten,)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach
Instead, it has warned users of its browser products to be careful when opening email attachments and to avoid untrusted websites

Does anybody in the whole world not know this?

4 posted on 03/27/2006 9:10:53 PM PST by Graybeard58 (Remember and pray for Sgt. Matt Maupin - MIA/POW- Iraq since 04/09/04)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

6 posted on 03/28/2006 5:16:01 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Ernest_at_the_Beach
Ok, I wonder if I could have been (hacked/exposed/whatever?) because when I got back to my work computer after this weekend, it now has the "about blank" browser-redirector on it.

I have no earthly .....how this happened...BUT, alot of my work involves email attaching (sending, mainly....NOT opening).

Might any kindly freepers help? Thank you in advance!

7 posted on 03/28/2006 7:10:27 AM PST by spankalib
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson