Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Security Flaw Found in Explorer
Associated Press ^ | Tuesday June 4, 9:30 pm Eastern Time | AP

Posted on 06/05/2002 8:53:25 AM PDT by rit

REDMOND, Wash. (AP) -- A security flaw in Microsoft's Internet Explorer browser could allow a hacker to take control of a remote computer if its user clicks a link to an outdated Internet protocol, a computer security firm says.
Oy Online Solutions Ltd. of Finland said it notified Microsoft Corp. of the security hole on May 20 but the software giant has yet to produce a software patch to fix the problem, the Toronto Star reported Tuesday.

A Microsoft spokesman who refused to be identified said Tuesday that the company is "moving forward on the investigation with all due speed" and will take the action that best serves its customers.

The problem concerns Gopher, an Internet protocol that predates the World Wide Web with pages like Web pages except that they are unable to store audio and video content.

Although Gopher is considered an outdated format for Internet content, it is still supported by Internet Explorer and most other browsers.

According to Oy Online, a hacker could take over a user's computer simply by having the user click on a link to a "hostile Gopher site." That one click would install and run any program the hacker chose on the victim's computer, and the victim might never know.

"The program could, for example, delete information from the computer or collect information and send it out from the computer," Oy Online said in a release. "(It) could also install a so-called backdoor (program) that would enable the hostile attacker to access the computer later."

All versions of Internet Explorer are believed to be vulnerable, the Star reported.

Refusing to confirm the security flaw, the Microsoft spokesman said the company "feel(s) strongly that speculating on the issue while the investigation is in progress would be irresponsible and counterproductive to our goal of protecting our customers' information."

And the spokesman added, "Responsible security researchers work with the vendor of a suspected vulnerability issue to ensure that countermeasures are developed before the issue is made public and customers are needlessly put at risk."

After being embarrassed on an almost regular basis by security flaws in its products -- including a debilitating problem found in its latest Windows XP operating system just days after its release -- Microsoft began a companywide training program on security issues earlier this year.

In January, Microsoft Chairman Bill Gates instructed employees to make software security a top priority.


TOPICS: Business/Economy; Technical
KEYWORDS: internetexplorer; microsoft; securityproblem; techindex
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-77 next last
Should be interesting in light of a think tank report coming out next week on how Microsoft's operating systems are more secure than open source technology.
1 posted on 06/05/2002 8:53:27 AM PDT by rit
[ Post Reply | Private Reply | View Replies]

To: rit
It can't be! The "Alexis de Tocqueville Institution" says that proprietary software is inherently secure, whereas open source software is the work of OBL.

They also say that you are better off sending your kids to a MCSE course, rather than college.

Nitwits.

2 posted on 06/05/2002 8:59:23 AM PDT by buaya
[ Post Reply | Private Reply | To 1 | View Replies]

To: rit
While I'm not a fan of MS, this is not entirely fair. Two weeks is not enough time to nail down the problem, write a patch, test the patch, and begin deployment. These folks were just looking to humiliate MS, rather than legitimately help fix security issues, and now there is the potential for users to suffer as a result.
3 posted on 06/05/2002 9:05:40 AM PDT by general_re
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
Two weeks is not enough time to nail down the problem, write a patch, test the patch, and begin deployment.

Security flaws in open source software are typically patched within hours of discovery.
4 posted on 06/05/2002 9:12:01 AM PDT by Dimensio
[ Post Reply | Private Reply | To 3 | View Replies]

To: general_re
A security hole in Opera was fixed within 24 hours - with a new .exe posted on their site for downloading.
5 posted on 06/05/2002 9:16:15 AM PDT by NativeNewYorker
[ Post Reply | Private Reply | To 3 | View Replies]

To: general_re
Buffer overflows are pretty easy problems to fix - just add code limiting the length of acceptable input, and you have it solved.

If there was a hypothetical buffer overflow in my code, I could fix it within an hour and if I had an exploit available I could release a verified fix within a day, tops.

D

6 posted on 06/05/2002 9:17:41 AM PDT by daviddennis
[ Post Reply | Private Reply | To 3 | View Replies]

To: Dimensio
Given how IE is integrated into the OS, I don't know that we can assume that the bug was simple or superficial. Who knows what sorts of dependencies rested on whatever DLL was the problem?

Besides, let's get real for a moment - you install such open-source patches solely at your own risk. About all you can assume is that the patch-writer got it to compile and run on his system without obviously barfing right off the bat - if it was produce three hours after the bug was reported, you know it didn't undergo much (any) testing for safety and security. Wouldn't you prefer to know that a patch was going to fix more problems than it creates?

7 posted on 06/05/2002 9:24:20 AM PDT by general_re
[ Post Reply | Private Reply | To 4 | View Replies]

To: rit
What did Gates know, and when did he know it? (;-)
8 posted on 06/05/2002 9:27:43 AM PDT by LurkedLongEnough
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
While I'm not a fan of MS, this is not entirely fair. Two weeks is not enough time to nail down the problem, write a patch, test the patch, and begin deployment.

How much time is needed to locate the code that deals with Gopher protocol, disable it, and re-compile? If more than an hour, get some new programmers

9 posted on 06/05/2002 9:30:22 AM PDT by SauronOfMordor
[ Post Reply | Private Reply | To 3 | View Replies]

To: general_re
Given how IE is integrated into the OS, I don't know that we can assume that the bug was simple or superficial. Who knows what sorts of dependencies rested on whatever DLL was the problem?

Usually exploits like this are based on a superficial issue that can be resolved with a simple change to a line of code. In this case it's an exploit using a network protocol to execute arbitrary code -- if Microsoft can't quickly fix that without breaking something then they should fire their programmers for incompetence.

Besides, let's get real for a moment - you install such open-source patches solely at your own risk. About all you can assume is that the patch-writer got it to compile and run on his system without obviously barfing right off the bat - if it was produce three hours after the bug was reported, you know it didn't undergo much (any) testing for safety and security. Wouldn't you prefer to know that a patch was going to fix more problems than it creates?

With open source, you usually can see what caused the problem because it's in the source code and the problem code is referenced in the bug report. Most "patches" for OSS are source code patches, not binary patches to compiled executables. Someone paranoid about breaking system functionality could easily look at the code that causes the exploit, examine the code that fixes it and determine just how serious it will be to apply it.
10 posted on 06/05/2002 9:31:28 AM PDT by Dimensio
[ Post Reply | Private Reply | To 7 | View Replies]

To: rit
"Responsible security researchers work with the vendor of a suspected vulnerability issue to ensure that countermeasures are developed before the issue is made public and customers are needlessly put at risk."

I can see where this is going:

Microsoft's security flaws are an issue of national security! Anyone who divulges or discusses a MS security flaw, without authorization and outside of established channels, should be immediately arrested and held in solitary confinement - forever!

11 posted on 06/05/2002 9:32:42 AM PDT by buaya
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dimensio
Security flaws in open source software are typically patched within hours of discovery.

I would bet that this flaw is not limited to the stated problem software, requiring MS to further investigate to be certain a patch will cover other flaws.

12 posted on 06/05/2002 9:33:24 AM PDT by DallasDeb
[ Post Reply | Private Reply | To 4 | View Replies]

To: rit
Yesterday and today, upon opening an e-mail (not an attached file) from a particular source -- using Outlook Express - my computer began sending out a continuous stream of information. Yesterday, I stopped it after about 4.5Mbytes going out. Today, I stopped it sooner. It's insidious.

Is my problem connected to the discovered MS flaw?

13 posted on 06/05/2002 9:33:47 AM PDT by thinktwice
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
a hacker could take over a user's computer simply by having the user click on a link to a "hostile Gopher site." That one click would install and run any program the hacker chose on the victim's computer, and the victim might never know.

Perhaps not fair in terms of announcing the problem before MS can respond about a fix.

But this indicates some really poor QA test suites (if they even exist for gopher). It would seem they're not even looking for security holes at the protocol session layer level...these aren't obscure buffer overflows.

14 posted on 06/05/2002 9:35:04 AM PDT by Starwind
[ Post Reply | Private Reply | To 3 | View Replies]

To: rit
Click here muahahahahahaha
15 posted on 06/05/2002 9:35:57 AM PDT by Texaggie79
[ Post Reply | Private Reply | To 1 | View Replies]

To: SauronOfMordor
How much time is needed to locate the code that deals with Gopher protocol, disable it, and re-compile?

Well, okay, yes, there is that. But I'm proceeding from the assumption that they want to preserve that functionality, and not throw the baby out with the bathwater ;)

16 posted on 06/05/2002 9:36:00 AM PDT by general_re
[ Post Reply | Private Reply | To 9 | View Replies]

To: rit
The problem concerns Gopher, an Internet protocol that predates the World Wide Web with pages like Web pages except that they are unable to store audio and video content.

Speaking of audio content... I wish Netscape and Microsoft would issue an update that allows me to prevent embedded MIDI files on a Web page from automatically executing.

Those cheesy, tinny tunes drive me nuts.

17 posted on 06/05/2002 9:38:57 AM PDT by tictoc
[ Post Reply | Private Reply | To 1 | View Replies]

To: rit
Gopher?

*sniff*

It brings back such memories. Sigh. Ah, Nostalgia.

18 posted on 06/05/2002 9:42:06 AM PDT by Vast Buffalo Wing Conspiracy
[ Post Reply | Private Reply | To 1 | View Replies]

To: rit

19 posted on 06/05/2002 9:42:48 AM PDT by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dimensio
Usually exploits like this are based on a superficial issue that can be resolved with a simple change to a line of code. In this case it's an exploit using a network protocol to execute arbitrary code -- if Microsoft can't quickly fix that without breaking something then they should fire their programmers for incompetence.

Look, you'll get no argument from me about the alleged competence (or lack thereof) from MS's programmers, but the reality is, you and I just don't know what the root cause of the problem is. And I'd bet good money that nether do the folks who first found the bug. To assume it's simple and superficial may be assuming too much.

Someone paranoid about breaking system functionality could easily look at the code that causes the exploit, examine the code that fixes it and determine just how serious it will be to apply it.

And you can tell at a glance how the new code will behave in all situations and contexts? Why do I suspect that when changes are written for something like glibc, where a bad patch could potentially break everything, they do a little bit of testing, rather than just shooting it out on a wing and a prayer?

I'm not arguing with the underlying premise here - that MS should produce patches, or face negative publicity. I just happen to think that something like 30 days is a more realistic minimum, especially given the size and institutional inertia of a company like MS. Give 'em 30 days, and then let the chips fall where they may, sez me...

20 posted on 06/05/2002 9:45:44 AM PDT by general_re
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-77 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson