I’m really getting to like some of the new tools coming out by Microsoft. I mean, you have to admit that they certainly can leverage their size and come out with a decent product every once in a while.
However, there is this streak in me that relishes using Mozilla Firefox just to get at Microsoft. There’s something about the little guy. Especially when the little guy is more extensible, more advanced, and there’s this…
The list of serious unpatched vulnerabilities in Microsoft’s Internet Explorer browser keeps getting longer and longer.
Less than a week after researcher Michal Zalewski went public with a new zero-day vulnerability that could be used in code execution attacks, the software maker has acknowledged yet another flaw affecting fully patched Windows systems.
The new IE flaw was discovered by Secunia researcher Andreas Sandblad during code analysis into the Zalewski warning.
In fact, Secunia initially reported its findings to Microsoft as a “successful exploit” of that bug, but according to Microsoft’s internal investigations, Secunia actually found a new problem.
“This is potentially a new, privately reported, exploitable vulnerability,” a Microsoft spokesperson told eWEEK.
Secunia has since updated its advisory with a note that its discovery is a “variant” of the bug reported by Zalewski.
The flaw is due to a memory corruption error when processing a specially crafted HTML script that contains malformed “object” tags, and could be exploited by attackers to remotely take complete control of an affected system by convincing a user to visit a specially crafted Web page.
“[We have] confirmed code execution on a fully patched system with Internet Explorer 6.0 and Microsoft XP SP2. Other versions may also be affected. Details about this variant will not be publicly disclosed at present, but have been sent to
Microsoft, who is currently working on a patch,” the company aid.