Microsoft patches 10 critical IE bugs
The fix for IE6 was finished last month, file date stamps show
Computerworld - Microsoft today shipped 2010's second rush update for Internet Explorer (IE), patching 10 vulnerabilities -- including one hackers have been exploiting for weeks.
That bug had been reported to Microsoft by a Beijing security company in mid-November, 2009, Microsoft confirmed, months before news broke that it was being used by attackers. In fact, Microsoft wrapped up work on the fix for IE6 by Feb. 26, according to date stamps on the affected file.
The update, tagged MS10-018, was released two weeks early because Microsoft had tracked a growing number of attacks against IE6 and IE7. The bug has been used by malicious sites to launch drive-by attacks for much of the month.
The last emergency IE update was issued January 21 to fix eight flaws, including one that had been exploited to attack Google, Adobe and scores of other companies. Google blamed China for the attacks, a move that led to its decision to relocate its Chinese-language search engine to Hong Kong.
All 10 vulnerabilities patched in today's update -- which was originally slated for release April 13, the next regularly-scheduled Patch Tuesday -- were rated "critical," the highest level threat in Microsoft's four-step scoring system. But there were clear differences in the risk profiles of different versions of IE.
IE6, the 2001 browser that many want to see dead and buried, was affected by eight of the 10 bugs, with seven of those eight marked critical. IE7, which debuted in 2006 prior to the release of Windows Vista, contained seven out of the possible 10, with five vulnerabilities tagged critical. IE8, on the other hand, was touched by just three of the 10, with only two critical.
"The message today should be to get onto IE8," said Andrew Storms, director of security operations at nCircle Network Security. "Not just ditch IE6, but dump IE6 and IE7."
For the most part, Storms saw the 10 vulnerabilities as "pretty typical IE bugs. Except for [CVE-2010-0806], none of them are particularly troublesome, or no more than we've come to expect." CVE-2010-0806 is the Common Vulnerabilities & Exposure ID for the vulnerability that prompted the rush, or "out-of-band," update.
And that vulnerability received most of the attention today from Storms and other researchers, including HD Moore, the creator of the Metasploit framework and chief security officer at security company Rapid7, which manages the open-source Metasploit project.
According to Moore, Microsoft's out-of-band hand was forced when a Taiwanese researcher nicknamed "Nanika" revamped public exploit code so that it worked reliably against not only IE6, but also the newer IE7. "Before, Microsoft said, 'Not that big a deal,' but then the facts changed and they say, 'Sorry, this does affect IE7 reliably.' They changed their mind."
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!