Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft warns of critical flaws in Internet Explorer - Attacker can take control of computer
IDG News Service ^ | August 21, 2003 | Peter Sayer

Posted on 08/21/2003 12:25:17 PM PDT by HAL9000

Microsoft warns of critical flaws in Internet Explorer

Flaws could enable attacker to take control of user's computer

AUGUST 21, 2003 (IDG NEWS SERVICE) - Microsoft Corp. released a patch for a number of flaws in its Internet Explorer (IE) Web browser yesterday, including two it rated "critical" for some versions of the browser, which could enable an attacker to take control of a user's computer.

The company also released a patch for a flaw, rated "important," in the MDAC (Microsoft Data Access Components) element of its Windows operating systems.

The critical flaws affect IE Versions 5.01, 5.5, 6.0 and 6.0 with Service Pack 1 installed, and could allow an attacker to run arbitrary code on a user's system if the user either visited a Web site or read an e-mail message in HTML designed to exploit the flaw, Microsoft said.

The flaw also affects IE 6.0 for Windows Server 2003, but Microsoft only rated the flaws on this platform "moderate," its third-highest danger rating, because the Windows Server 2003 version of IE is delivered in a default configuration, which prevents exploitation of these flaws. Nevertheless, users who have changed the default configuration may have made their systems vulnerable.

Microsoft urged systems administrators to immediately install the patch, described in Microsoft Security Bulletin MS03-032. The patch brings together all previously released fixes for the affected versions of IE.

The first of the two critical flaws relates to a potential buffer-overrun vulnerability in a now-obsolete ActiveX control in part of the Windows HTML help system. The patch sets the Kill Bit on the BR549.DLL ActiveX control, which disables the control and prevents it from being reinstalled. The control was part of the Windows Reporting Tool, no longer supported in IE.

The second critical flaw is due to IE's mishandling of object tags in HTML pages. When the browser encounters an object tag and requests a file from a Web server, it doesn't check that the file returned is of the correct type. This could allow an attacker to make IE execute a program of their choice, using the security privileges of the user.

The patch also fixes a vulnerability rated important in IE's cross-domain security model, which is intended to prevent browser windows accessing Web sites in different security zones from interfering with one another, according to the security bulletin. This allows scripts in the Internet security zone -- for example, on Web sites or in HTML-format e-mail, to access files in the My Computer zone by exploiting an error in the way IE retrieves files from the browser cache.

In a separate security bulletin, MS03-033 the company warned of an important vulnerability, its second-highest danger rating, in the MDAC element of its Windows operating system.

The flaw affects MDAC Versions 2.5 through 2.7, which are included by default with Windows XP, Windows 2000 and Windows Millennium Edition. MDAC software is also part of other Microsoft software, including Windows NT 4.0 Option Pack, and the Access and SQL Server databases.

MDAC 2.8, the version that ships with Windows Server 2003, doesn't have the vulnerability, Microsoft said.

The flaw in MDAC could allow an attacker to run arbitrary code on a vulnerable system, but to do so, the attacker would need to set up a fake SQL server on the same subnet as the target system, Microsoft said. It encouraged systems administrators to install the patch, which also includes a fix for an earlier vulnerability, reported in Security Bulletin MS02-040.



TOPICS: Front Page News; News/Current Events; Technical
KEYWORDS: hackers; herewegoagain; ieeeeeeeeee; internetexplorer; lowqualitycrap; microsoft; patchpatchpatchpatch; switchtoapple; windows
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-68 next last
If you use Windows, remember to set aside an hour or two each day to read the latest Microsoft security bulletins and apply the daily patches.
1 posted on 08/21/2003 12:25:19 PM PDT by HAL9000
[ Post Reply | Private Reply | View Replies]

To: HAL9000
what? a security flaw in a microsoft product? impossible!

dep

2 posted on 08/21/2003 12:26:30 PM PDT by dep (Ense Petit Placidam Sub Libertate Qvietem)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
I take it we're supposed to be surprised or something.
3 posted on 08/21/2003 12:28:23 PM PDT by Prof Engineer (HHD: Middle Earth First, We'll Electrify the Rest Later)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
for bugs like this firewalls are worse than useless.
4 posted on 08/21/2003 12:28:25 PM PDT by adam_az (.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Loaded them last night. No work on my part.

Glad to see that MS is doing what it can to circumvent the script kiddies.

5 posted on 08/21/2003 12:30:02 PM PDT by Cold Heat (Nothing in my home is French!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Here we go again.
6 posted on 08/21/2003 12:31:05 PM PDT by Bikers4Bush
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Microsoft Windows:

Got lead in your pipes?
7 posted on 08/21/2003 12:31:53 PM PDT by VxH
[ Post Reply | Private Reply | To 1 | View Replies]

To: wirestripper
Loaded them last night. No work on my part.

No problem at War Eagle Boats either, and they didn't even have to load a patch.

8 posted on 08/21/2003 12:38:32 PM PDT by HAL9000
[ Post Reply | Private Reply | To 5 | View Replies]

To: HAL9000
Bootable Linux CD + rdesktop + cheap old harddiskless PCs + W2K servers. Solution to all problems. Pushing for it at work but will probably be shot down due to politics.
9 posted on 08/21/2003 12:38:32 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
The patch sets the Kill Bit on the BR549.DLL ActiveX control...

Hey... MS programmers do have a sense of humor... I'm a grinnin'.

10 posted on 08/21/2003 12:40:29 PM PDT by TechJunkYard (because... so much is riding on your wires)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
No problem at War Eagle Boats either

LOL! Small world.......... Do we know each other?

11 posted on 08/21/2003 12:42:20 PM PDT by Cold Heat (Nothing in my home is French!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: HAL9000
"Microsoft urged systems administrators to immediately install the patch, described in Microsoft Security Bulletin MS03-032. The patch brings together all previously released fixes for the affected versions of IE."

Rrrriiiight Ill just tell my director I need to reboot our environment tonight, thank goodness this only happens 4 or five timeas **A MONTH**! anyone who uses windows in a place that a UNIX server can do the same job is nuts. Forget the cost, forget the GPL (Linux) or BSD (BSD), forget anything other than you can patch a server and leave it up 90% of the time!

12 posted on 08/21/2003 12:43:00 PM PDT by N3WBI3
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Thanks for the info. Today I notice my Norton Antivirus checking outgoing mail when I have not sent any out going mail. Later in the day my email had 2 undeliverable email. HUH?? My provider suggested that I re-format my computer.
13 posted on 08/21/2003 12:50:10 PM PDT by Orange1998
[ Post Reply | Private Reply | To 1 | View Replies]

To: wirestripper
"Loaded them last night. No work on my part."

Try managing the patches on 70,000 desktops.
14 posted on 08/21/2003 12:55:02 PM PDT by jbstrick (Behold the Power of CHEESE!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: wirestripper
LOL! Small world.......... Do we know each other?

Not yet, but maybe I'll get down there for the next Jed Clampit party.

15 posted on 08/21/2003 12:58:48 PM PDT by HAL9000
[ Post Reply | Private Reply | To 11 | View Replies]

To: jbstrick
Try managing the patches on 70,000 desktops.

LOL!

Memo's?

Just kiddin!

16 posted on 08/21/2003 1:00:20 PM PDT by Cold Heat (Nothing in my home is French!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Howlin; Ed_NYC; MonroeDNA; widgysoft; Springman; Timesink; dubyaismypresident; Grani; coug97; ...
More crap from Microsnot.

Just damn.

If you want on the new list, FReepmail me. This IS a high-volume PING list...

17 posted on 08/21/2003 1:02:53 PM PDT by mhking
[ Post Reply | Private Reply | To 1 | View Replies]

To: HAL9000
Lookin forward too it! I can handle the introductions.
18 posted on 08/21/2003 1:03:09 PM PDT by Cold Heat (Nothing in my home is French!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: HAL9000
*whew* well thank goodness Linux can't be hacked
19 posted on 08/21/2003 1:03:09 PM PDT by RedBloodedAmerican (/sarcasm)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sigSEGV
Bootable Linux CD + rdesktop + cheap old harddiskless PCs + W2K servers.

Care to expand on this please?

20 posted on 08/21/2003 1:04:02 PM PDT by LTCJ
[ Post Reply | Private Reply | To 9 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-68 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson