'Extremely critical' flaw threatens IE users
Security experts are warning of a new and highly critical security flaw in Microsoft Internet Explorer, when running under Windows XP SP2.
Simply visiting a malicious Web site could leave a user's computer vulnerable to malicious code.
The basic flaw has been known about for two months, but security experts originally thought it would be difficult to exploit. However, after further study, security firm Secunia now says the bug represents a greater danger than previously believed.
Secunia now rates the vulnerability as "extremely critical."
In an alert posted on its Web site, Secunia lists three problems in IE that, in combination, create the vulnerability:
"Insufficient validation of drag and drop events from the Internet zone to local resources for valid images or media files with embedded HTML code;
"A security site/zone restriction error in the handling of the Related Topics command in an embedded HTML Help control can be exploited by e.g. a malicious website to execute arbitrary script code in the context of arbitrary sites or zones."
The exploit bypasses a key SP2 security feature, Zone Lock Down, which is designed to prevent an attacker from remotely executing script on a local system.
The vulnerability was identified initially by security group Greyhats, which warned of the bug late last month.
Microsoft is recommending that users turn off the "Drag and drop or copy and paste files" option in Internet Explorer and set security levels to high for the Internet zone.
Security experts note that the problem does not affect other browsers.
Secunia has constructed a test, available on the firm's Web site, that users can run to determine whether their systems are affected by this issue.
Microsoft releases Windows security fixes
Microsoft Corp. released two security fixes Tuesday that carry its most severe threat rating, including one that applies even to computers that have downloaded the company's massive security update for the Windows XP operating system.
Both flaws affect versions of the company's dominant operating system going back to Windows 98, and both could allow an attacker to take control of another person's computer.
One of the flaws also leaves vulnerable users who have downloaded Service Pack 2, a major security upgrade for Windows XP that was released last summer. The security fix came after a series of crippling attacks on Microsoft's technology, which have wreaked havoc on both businesses and computer users.
Stephen Toulouse, a security program manager at Redmond-based Microsoft, said the company never expected SP 2 to solve all of its security problems.
"We knew we were going to be providing updates for SP2," he said. "The goal was always around reducing the number of critical updates."
The flaw that affects SP2 takes advantage of a problem with Internet Explorer that could allow an attacker to gain control of a computer if a user was persuaded to visit a malicious Web site.
The other flaw could be exploited if a user employs a specially formulated cursor or icon that secretly allowed an attacker to gain control of another person's computer.
Microsoft also released a third security fix Tuesday with a lesser rating of "important." That vulnerability, which also could allow another person to gain control of a user's computer, affects machines running Windows XP and Windows Server 2003.
The new security fixes, released as part of Microsoft's regular monthly security updates, come a week after Microsoft said it would begin offering a free program to remove the most dangerous infections from computers. Users who have chosen to automatically receive Microsoft security fixes would begin to receive that removal tool Tuesday, Toulouse said.
Last week the company also began offering a free program to remove spyware. Spyware can monitor computer users' activities, send annoying pop-up ads and slow computer performance.
Microsoft also has confirmed plans to sell its own antivirus software, which would compete against programs from McAfee, Symantec and others.