Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

New Security Advisory (MSA 977981)


  • Please log in to reply
No replies to this topic

#1 Papakid

Papakid

    Guru at being a Newbie


  • Malware Response Team
  • 6,549 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:53 PM

Posted 24 November 2009 - 11:33 AM

A security advisory was issued by Microsoft yesterday regarding a vulnerability in Internet Explorer that is, as yet, unpatched.

Microsoft Security Advisory (977981)
Vulnerability in Internet Explorer Could Allow Remote Code Execution
http://www.microsoft.com/technet/security/...ory/977981.mspx

(Formatting for emphasis added by me.)

Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 and Internet Explorer 8 on all supported versions of Microsoft Windows are not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6 and Internet Explorer 7 on supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 are affected.

The vulnerability exists as an invalid pointer reference of Internet Explorer. It is possible under certain conditions for a CSS/Style object to be accessed after the object is deleted. In a specially-crafted attack, Internet Explorer attempting to access a freed object can lead to running attacker-supplied code.


This is still under investigation by MS--as related in the article a patch for this vulnerability may or may not be released. The upshot is that if you haven't upgraded to Internet Explorer 8 yet you would best do it now. Or use alternate browsers, such as Firefox and Opera, exclusively. In my opinion, it is best to have a secure version of Internet Explorer onboard even if your default browser is something else.

Read the entire article for workarounds, which include enabling Data Execution Prevention. However, as is usually the case with workarounds issued by MS, they could significantly alter your user experience.

The fate of all mankind, I see

Is in the hands of fools

--King Crimson


BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users