Posted on 11/25/2003 3:20:08 PM PST by Salo
Posted: 25/11/2003 at 18:01 GMT A set of five unpatched scripting vulnerabilities in Internet Explorer creates a mechanism for hackers to compromise targeted PCs.
The vulnerabilities,unearthed by Chinese security researcher Liu Die Yu, enable malicious Web sites and viruses to bypass the security zone settings in IE6. Used in combination, the flaws might be exploited to seize control of vulnerable PCs.
Proof of Concept exploits have been released by Liu Die Yu to validate his warnings.
Microsoft has yet to patch the flaws. But users can protect themselves against the flaws by disabling active scripting or by using an alternative browser.
Thomas Kristensen, CTO of security Web site Secunia, toldThe Register that the five distinct vulns could used in combination to install executables (viruses, Trojans and porn diallers). Secunia describes the vulnerabilities as "extremely critical".
Despite this, Kristensen warns that Microsoft is unlikely to break its newly instituted monthly release cycle to release a stand-alone IE patch unless a vulnerability was widely exploited. Pending the availability of a patch, Secunia advises all IE users to disable active scripting.
The drawback of this workaround is that with some Web sites certain functions won't work unless scripting is enabled. IE users should define any sites they need to use as trusted so that they can continue to use scripting on those sites alone, Kristensen advised.
Secunia's advisory is here. ®
Release Date: 2003-11-25
Critical: Extremely critical
Impact: System access Exposure of sensitive information Cross Site Scripting Security Bypass
Where: From remote
Software: Microsoft Internet Explorer 5.01 Microsoft Internet Explorer 5.5 Microsoft Internet Explorer 6
Description: Multiple vulnerabilities have been identified in Internet Explorer, which in combination can be exploited to compromise a user's system.
1) A redirection feature using the "mhtml:" URI handler can be exploited to bypass a security check in Internet Explorer, which normally blocks web pages in the "Internet" zone from parsing local files.
2) The above redirection feature can also be exploited to download and execute a malicious file on a user's system. Successful exploitation requires that script code can be executed in the "MyComputer" zone.
3) A cross-site scripting vulnerability can be exploited to execute script code in the security zone associated with another web page if it contains a subframe. This may potentially allow execution of script code in the "MyComputer" zone.
4) A variant of a fixed vulnerability can still be exploited to hijack a user's clicks and perform certain actions without the user's knowledge.
For more information: SA9711
5) An error in the download functionality can be exploited to disclose a user's cache directory by supplying a "HTM" file extension and an invalid value in the "Content-Type:" header field. This issue does not affect all versions and may have been fixed by the latest patch for Internet Explorer.
The vulnerabilities have been reported in Internet Explorer 6.0. However, other versions may also be affected and have been added due to the criticality of these issues.
PoC exploits (Proof of Concept) are available.
Solution: Disable Active Scripting.
Use another product.
www.opera.com
1. Go to http://www.mozilla.org/
2. Download Mozilla web browser.
3. Stop using Internet Explorer.
Use another product.
I do. I use Firebird.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.