Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft To Plug Devastating Browser Download Hole
Newsbytes ^ | 12/12/2001 | Brian McWilliams

Posted on 12/11/2001 9:11:38 PM PST by toupsie

  Microsoft To Plug Devastating Browser Download Hole

By Brian McWilliams, Newsbytes
REDMOND, WASHINGTON, U.S.A.,

11 Dec 2001, 1:09 PM CST Microsoft [NASDAQ:MSFT] will patch a flaw in its Web browser that could allow an attacker to silently download and execute malicious programs on the computers of users who view a specially constructed Web page or e-mail message.

The patch for Internet Explorer (IE) is currently in testing and could be released soon, according to Jouko Pynnonen, a security researcher with Finland's Oy Online Solutions. Pynnonen reported the IE vulnerability to Microsoft on Nov. 19 and recently tested the software fix at the company's request.

The vulnerability affects IE for Windows versions 5, 5.5, and 6, said Pynnonen. Citing the severity of the flaw, he refused to release technical details about the method he found for bypassing the browser's system for securely handling downloaded files.

A Microsoft spokesperson said the company does not currently have any information to share on the issue and declined to discuss the status of the browser patch.

By design, IE should warn users when they attempt to download and open an executable file. But as a result of the security flaw, a malicious Web site could "relatively easily and unnoticeably ... spread virii, install DDoS zombies or backdoors, format hard disks, and so on," wrote Pynnonen in an advisory posted Nov. 26 to Bugtraq, a mailing list for security experts.

Pynnonen revealed that the bug lies in IE's processing of Internet addresses and "header" information that tells the browser what type of file it is handling. The flaw is particularly dangerous because it can be exploited using ordinary Web page code, without help from JavaScript or other scripting programs, he said.

Oy Online Solutions offered to demonstrate the flaw at a private Web site only if recipients of the demo signed an agreement not to disclose information about the exploit.

Chris Wysopal, director of research and development for AtStake, a security consulting firm, characterized the IE download flaw as "a very serious problem" and potentially one of the most severe ever to affect the browser.

However, to exploit the vulnerability, "attackers would probably need control of a Web server so that they could control the information sent in the HTTP header," Wysopal said. As a result, attacks could be traced to the malicious site.

According to Pynnonen, the vulnerability also may affect users of Microsoft's Outlook and Outlook Express e-mail readers, which rely on IE to display messages in Web-page or HTML format. Qualcomm's Eudora e-mail reader, which optionally uses IE for HTML display, could also be vulnerable, he said.

Until the patch is available from Microsoft, Pynnonen said concerned users can temporarily disable IE's ability to download files. To do so, users should select Internet Options from the Tools menu. Then select the Security tab and click on Custom Level. Scroll down to the listing for Downloads and disable file downloads.

Pynnonen's initial advisory on the flaw did not describe the automatic downloading vulnerability and was concerned instead with the browser's failure to properly differentiate between file types.

A subsequent message sent to Microsoft and Bugtraq Nov. 28 described the more serious issues but was not published on Bugtraq by joint agreement between Pynnonen and the list's moderator, the security researcher said.

Microsoft initially denied that the ability to "spoof" file types in IE represented a security vulnerability, but the company later changed its position, according to Pynnonen.

Last month Microsoft patched a security flaw in IE's handling of browser cookie files after Pynnonen reported the vulnerability to the company.

Pynnonen's original report on the IE download spoofing flaw is at http://www.solutions.fi/index.cgi/news_2001_11_26?lang=eng

Microsoft security information site is at http://www.microsoft.com/technet/security/default.asp

Reported by Newsbytes, http://www.newsbytes.com .

13:09 CST
Reposted 13:33 CST

(20011211/WIRES ONLINE, LEGAL, PC/HOLE/PHOTO)


TOPICS: Breaking News; News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 261-269 next last
To: Dominic Harr
I heard even microsoft uses a tier of unix servers in front of everything it has on the web because its servers are so prone to security problems. I know for sure that all of hotmail is run on Sun Solaris (unix).
21 posted on 12/11/2001 10:02:57 PM PST by awestk
[ Post Reply | Private Reply | To 10 | View Replies]

To: Diddle E. Squat
6pm to 6am. :)
22 posted on 12/11/2001 10:04:01 PM PST by RadioAstronomer
[ Post Reply | Private Reply | To 20 | View Replies]

To: RadioAstronomer
The Ironman.
23 posted on 12/11/2001 10:08:34 PM PST by Diddle E. Squat
[ Post Reply | Private Reply | To 22 | View Replies]

To: RadioAstronomer
I'm only running Zone Alarm myself. would you mind copying and pasting Diddle E Squat's email and dropping it my way, or simply posting it here? Thanks.
24 posted on 12/11/2001 10:13:35 PM PST by monkeyshine
[ Post Reply | Private Reply | To 11 | View Replies]

To: RadioAstronomer
You do tech support?
25 posted on 12/11/2001 10:15:34 PM PST by paul544
[ Post Reply | Private Reply | To 22 | View Replies]

To: toupsie
Agreed. However, I recently "upgraded" to Opera 6.0. It is still beta. Numerous bugs, but still better than IE.
26 posted on 12/11/2001 10:16:59 PM PST by paul544
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dominic Harr
Which do you think it was? On purpose, or pure accident?

It's hard to say. Microsoft has a terrible track record at ignoring known security risks to add features they think are "cool". Some of the security flaws are through negligence, and some are through willful disregard.

Here is another possibility - the government may have requested Microsoft to leave a backdoor entry point for "key loggers" and such. USG is definitely leaning on the anti-virus software vendors to allow their spyware to be installed without the user's knowledge.

27 posted on 12/11/2001 10:18:05 PM PST by HAL9000
[ Post Reply | Private Reply | To 18 | View Replies]

To: paul544
To all! :) Ok I will post it here on the thread what I use and why :)

Nope no tech support. For my job, I "fly" satellites/spacecraft from a mission control room for a living. :)

28 posted on 12/11/2001 10:23:03 PM PST by RadioAstronomer
[ Post Reply | Private Reply | To 25 | View Replies]

To: monkeyshine
Yup will post it. :)
29 posted on 12/11/2001 10:23:31 PM PST by RadioAstronomer
[ Post Reply | Private Reply | To 24 | View Replies]

To: HAL9000
This just matches microshaft Lookout, err Outlook for lack of security.

PS, watch for anti-virus company stocks tommorrow.

You can hear the microsofties now-- this is great for business!

30 posted on 12/11/2001 10:40:20 PM PST by quimby
[ Post Reply | Private Reply | To 27 | View Replies]

To: Mid-MI Student
Better yet, get a Mac!

Isn't it nice to never have to worry about this stuff?

:)

31 posted on 12/11/2001 10:44:07 PM PST by PianoMan
[ Post Reply | Private Reply | To 2 | View Replies]

To: Bush2000
I can't use a Mac. I'm heterosexual.

I can't use Windows. I have an IQ over 18.

32 posted on 12/11/2001 10:59:07 PM PST by ikka
[ Post Reply | Private Reply | To 9 | View Replies]

To: JoeSchem
or if they'll try to distract with feeble wisecracks questioning the intelligence, sexuality and patriotism of anyone who uses non-Microsoft products

See post #9.

33 posted on 12/11/2001 10:59:44 PM PST by ikka
[ Post Reply | Private Reply | To 12 | View Replies]

To: PianoMan
I'm an all-microsoft shop and dont worry about any of it. But that's just me.
34 posted on 12/11/2001 11:02:36 PM PST by zeromus
[ Post Reply | Private Reply | To 31 | View Replies]

To: RadioAstronomer
"Naw, just run AnalogX Script defender, A good firewall, realtime Trojan/bot detector, realtime virus detector, and a good spyware blocker."

And configure and update and patch them all properly of course.

Gee, is that all?

I understand why one of our tech MS support folks once said, "hey, I'm glad this stuff doesn't work very well, that's why I have a job."

Here's the root of the problem: Executable document files. Nice function but it's a fuse you hang out for all the world to light.

Don't sell (or buy) elevators until you're sure they are safe.

35 posted on 12/11/2001 11:02:59 PM PST by D-fendr
[ Post Reply | Private Reply | To 7 | View Replies]

To: D-fendr
Ok. What I understand from your post is don't use these? I think Ad-Aware is fabulous and I will point you to a site/forum dedicated to computer security. I'm no expert! But some of these guys are.
36 posted on 12/11/2001 11:17:42 PM PST by RadioAstronomer
[ Post Reply | Private Reply | To 35 | View Replies]

To: RadioAstronomer
Hey I do that too. But every time those damn Kligons take out my Enterprise, I have to restart.
37 posted on 12/11/2001 11:18:11 PM PST by paul544
[ Post Reply | Private Reply | To 28 | View Replies]

To: paul544
ROFL! :)
38 posted on 12/11/2001 11:26:27 PM PST by RadioAstronomer
[ Post Reply | Private Reply | To 37 | View Replies]

To: RadioAstronomer
No, I appreciate your tips and if it works for you, I'm glad. My point was that it's not practical for a mass marketed product to require this level of technical expertise and effort and expense - in order to avoid a catastrophic failure.

We have a near monopoly supplier of tools that are not safe to use for the mass of consumers.

I fault the company selling them for being irresponsible, the consumer for buying them, and the technicians, IT staff and trade media for supporting the dangerous scaffolding.

Until these functions can be made safe - out of the box - it's irresponsible to spread them to unknowing and vulnerable users.

thanks for your reply, I was unclear and brusque; I apologize.

39 posted on 12/11/2001 11:28:24 PM PST by D-fendr
[ Post Reply | Private Reply | To 36 | View Replies]

To: D-fendr
Here's the root of the problem: Executable document files. Nice function but it's a fuse you hang out for all the world to light.

Yes, that's part of it. The other part is ... well, I probably shouldn't say, 'cuz now that I think about it, it'd be really really easy to exploit it & do damage. Basically it makes trojan horses very easy to create.

Gee, this is a conundrum, because I kinda like the feature in question. That is, I understand why they decided to treat files the way they do.

40 posted on 12/11/2001 11:31:16 PM PST by jennyp
[ Post Reply | Private Reply | To 35 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 261-269 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson