The Locksmith in this issue discloses the details of the new IE vulnerability IFrame for extremely dangerous.
A new hazardous vulnerability for IE6.0 has been exposed, and the method of using this vulnerability is also disclosed. However, it can only be said that it is possible to decrease the level of harm to the vulnerability. There is no thorough protection.
Details
US-CERT recently released a vulnerability report,
Vu # 842160, which mentioned the recent IE6.0 vulnerability. This vulnerability is related to a boundary error that may cause and
US-CERT has made this problem as described below: There is a buffer overflow vulnerability when IE processing Frame and IFRAME's SRC and Name properties. The disclosed code uses the vulnerability code uses JavaScript, which is accumulated in memory with the data block composed of NOP and shell code. After using too long SRC and Name properties, IE will give up management of memory addresses and make memory over one of the previous stacked blocks, execute NOP, and attacker's shell code. Implementing attacks will become very difficult under conditions without pre-preparing the stacking block capabilities.
A Microsoft spokesperson said when answering my question: "Microsoft is studying the possible IE vulnerability of the new announcement. We did not find any incidents that used the vulnerabilities reported, but no consumers were affected, but we Will focus on this report. "
"Microsoft will take appropriate measures to protect our consumers, may take the monthly release patch, or provide unconventional security upgrades, which will depend on consumer needs."
RedMond Software also expressed concern about this unrelegant public vulnerability information rather than first informing Microsoft: "This method usually puts computer users in danger. We will continue to encourage disclosures for vulnerabilities We believe that the vulnerability situation is known directly, which helps ensure consumers get a comprehensive high-quality upgrade service for security vulnerabilities, without reminding the company that is exposed to malicious attackers when the company is developing patch. "
Until the vulnerability message passed in the hacking community, Aus-Cert (ie Australian Cert), US-CERT, and Secunia were announced this vulnerability. Therefore, a wise practice is to first notify the vulnerability information to the software manufacturer. Because the relevant vulnerability event is disclosed on the network, many users feel very important. Safety sites will be published as soon as possible after getting these news, then IT professionals can take necessary precautions.
Microsoft ends with the following words to end your questions: "If consumers suspect that they have been infected to contact the product support service (North American users can use the PC Safety Hotline (1-866-PCSafety) to seek about Security upgrades or virus issues, international users can use the contact information listed in http://support.microsoft.com. "
applicability
Secunia is also special
The vulnerability is reported in IE 6.0 that runs Windows 2000 and Windows XP (even if XP installed service pack 1). But Secunia (and US-CERT) also reports XP SP2 will not be threatened.
US-CERT also warned that the same vulnerability may exist in other applications that use WebBrowser Activex control, such as Outlook, Outlook Express, AOL, and Lotus Notes, such as Microsoft Outlook, Outlook Express, AOL, and Lotus Notes.
AUS-CERT confirms that XP SP2 will not be threatened by this vulnerability. But AUS-CERT also warned that XP SP2 may be affected under more skilled attacks on the same vulnerability. Threat level - from very serious to extreme danger
Secunia evaluates this vulnerability to "Extremely critical". This vulnerability may cause IE crashes, and this vulnerability may also allow attackers to perform any code on the system. Anti-virus software does not seem to prevent this threat.
Mitigation method
WINDOWS XP to install SP2 is clearly not affected, so if you install SP2 patches on a Windows XP system, you can avoid the threats brought by this vulnerability.
Attackers may attract users to a malicious site or attract them to open a HTML message. System administrators need to emphasize users to be highly vigilant for two attack methods.
Is it completely solved? Still just part?
Now, according to Secunia and US-CERT's report, there is no thorough solution for this issue. However, it is clear that open emails in plain text can be used as a method of eliminating major threats. You can also disable event scripts and upgrade Windows XP to SP2. AUS-CERT also recommends using other web browsers.
Conclude
This report really made me feel that I have completely clear a hard drive before installation of Windows XP Pro and the SP2 patch is not so stupid. This will be my main working system before SP2 will be infected. (Until now, everything is fine. Although I know that many people have encountered trouble, the vulnerability will not have substantive threats to SP2.)