New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 22)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 874
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image microsoft: Beware!: Leaked Windows Code Opens IE Hole image
Microsoft


Leaked Windows Code Opens IE Hole
Bug hunters use source code to identify flaw in widely-used browser.
Joris Evers,
IDG News Service

A bug hunter claims to have uncovered a security flaw in Microsoft's Internet Explorer 5 Web browser by studying Windows source code that was leaked last week.

The vulnerability allows an attacker gain control over a user's computer by using a specially crafted bitmap file. When loaded using IE 5, the file will trigger an overflow error and allow the attacker to run arbitrary code on a victim's machine, according to a description of the flaw posted Sunday on the SecurityTracker.com Web site.

The flaw was uncovered by reviewing IE source code that was part of a larger Windows code leak last week and exists in all versions of IE 5 for all Windows versions, according to the description.


World Wide Web
Vulnerable versions of IE are used by millions of Internet users. As of February 16, 17 percent of Internet users worldwide had some version of IE 5 installed, according to San Diego-based Web tracking company WebSideStory.

Thor Larholm, senior security researcher at PivX Solutions in Newport Beach, California, confirms the vulnerability. He investigated the report and tested code to exploit the flaw.

The IE 5 problem proves the security implications of the code leak, where a malicious coder could take advantage of the source code to find security holes, Larholm says. This has definitely proven the potential for critical vulnerabilities, he says.

Microsoft began investigating the vulnerability report on Monday, the company says in a statement. The security problem is a known issue that the Redmond, Washington-based vendor discovered internally before and fixed in IE 6.0, according to the statement.


Upgrade Available
Microsoft urges IE 5 users to upgrade to IE 6.0 with Service Pack 1. However, IE 5.01 with Service Pack 2 is still supported, according to Microsoft's product support Web page. The vendor is working on a patch for this and other versions of IE predating IE 6.0 and is investigating why it did not fix the vulnerability in those versions before, a Microsoft spokesperson says Tuesday.

Microsoft last week said that incomplete portions of its closely-guarded Windows NT and Windows 2000 source code, the blueprints of the operating system software, had been leaked on the Internet.

Analysts and security experts at the time warned that a breach of the Windows source code could expose users to an increase in cyberattacks because it would make it easier for hackers to find holes in the operating systems that they could exploit.

More at PCWorld
Posted on Thursday, 19 February 2004 @ 10:58:10 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· Google Microsoft Search
· Microsoft
· Technet Online
· HotFix & Security Bulletins
· More about Microsoft
· News by phoenix22


Most read story about Microsoft:
Internet Explorer file:// Request Zone Bypass Vulnerability

image
Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register