The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Critical Internet Explorer patch avaliable on update

    Discussion in 'Windows OS and Software' started by Tinderbox (UK), Jan 21, 2010.

  1. Tinderbox (UK)

    Tinderbox (UK) BAKED BEAN KING

    Reputations:
    4,740
    Messages:
    8,513
    Likes Received:
    3,823
    Trophy Points:
    431
    I just checked and it on my update :)

    http://www.pcadvisor.co.uk/news/index.cfm?newsid=3210703

    Microsoft has announced that it will release its emergency patch for Internet Explorer (IE) at 6pm GMT today, and also admitted that attacks can be hidden inside rigged Office documents.

    Earlier this week, Microsoft confirmed speculation that it would issue an 'out-of-band' update for the IE vulnerability, but postponed specifying a ship date until last night.

    Microsoft also updated the security advisory it originally published last week when it acknowledged a zero-day IE vulnerability had been used by hackers to break into the corporate networks of Google and other major Western companies. Google has alleged that the attacks were launched by Chinese attackers. Subsequently, security experts have offered evidence that links the attacks to China.

    The revised advisory also addressed claims made by researchers that it's possible to exploit the newer IE7 and IE8 browsers, and even circumvent Microsoft's recommended defensive measure, DEP (data execution prevention). However, the advisory waffled on whether DEP bypass was effective, neither confirming or denying the researchers' allegations.

    "There is a report of a new Data Execution Prevention (DEP) exploit," Microsoft said in the advisory. "We have analysed the proof-of-concept exploit code and have found that Windows Vista and later versions of Windows offer more effective protections in blocking the exploit due to Address Space Layout Randomization (ASLR)."

    Even a follow-up post by Jonathan Ness, an MSRC engineer, on the company's Security Research & Defense blog declined to spell out whether the DEP bypass attacks were effective. Ness, however, did reiterate Microsoft's point that the only in-the-wild attacks seen thus far have been aimed at IE6.

    He also touted the additional security that ASLR and IE's Protected Mode provide, and published a table that spelled out the current attack and threat situation for IE and Windows users.

    Microsoft also admitted that the vulnerability could be exploited through malicious Office documents, a vector that had not been disclosed previously. "We are also aware that the vulnerability can be exploited by including an ActiveX control in a Microsoft Access, Word, Excel, or PowerPoint file," said Bryant. "To prevent exploitation, we recommend that customers disable ActiveX Controls in Microsoft Office."

    Today's update for IE will patch all attack avenues, Bryant added, including the Office document vector.

    The IE vulnerability has gained considerable attention because it has been connected to the attacks that broke into Google's corporate network. McAfee was the first to reveal that the attacks against Google had been conducted using exploits of the IE vulnerability.

    Since then, hackers have exploited the bug via drive-by attacks from malicious sites, and researchers have crafted new attack code that works on IE7 and IE8.

    The last time Microsoft shipped an emergency security update was July 2009, when it patched IE just hours before several researchers demonstrated a critical vulnerability at a security conference. In October 2008, Microsoft rushed out a patch for Windows; that vulnerability was later exploited by the notorious Conficker worm.
     
  2. Padmé

    Padmé NBR Super Pink Princess

    Reputations:
    4,674
    Messages:
    3,803
    Likes Received:
    0
    Trophy Points:
    105
    Thanks updating now. :)
     
  3. newsposter

    newsposter Notebook Virtuoso

    Reputations:
    801
    Messages:
    3,881
    Likes Received:
    0
    Trophy Points:
    105
    The patch isn't universally available yet. Depends on your time zone as download servers update. Should be available globally by 2359 GMT today.
     
  4. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    Wow, 8,5MB Update - updating - even though do to the lack of a good add blocker I'm generally on FF.

    Thanks for the notice.
     
  5. xP_One

    xP_One Notebook Enthusiast

    Reputations:
    0
    Messages:
    17
    Likes Received:
    0
    Trophy Points:
    5
    Just finished my update.