Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Long-awaited IE patch (finally) arrives

Praise be!


Microsoft released an unscheduled security patch on Friday designed to fix a trio of serious security problems affecting users of its ubiquitous Internet Explorer Web browser. All three of the security vulnerabilities might be exploited to take control of vulnerable systems, so patching is a necessity.

The flaws involve: an integer overflow involving the way IE processes bitmap files, a memory processing vulnerability in the processing of GIF files and a scripting vulnerability that was the basis of June's Download.Ject (Scob) attack. All three of these vulnerabilities have been reported to be relatively straightforward to exploit. "Even vigilant users visiting a malicious website, viewing a malformed image, or reading an HTML-rendered email message may be affected," according to a bulletin from security clearing house US-CERT. No surprise, then, that Redmond gives all three vulnerabilities its dreaded "critical" security classification.

IE versions 5.01, 5.5. and 6 on multiple Windows platforms are affected so it promises to be a busy day for sysadmins everywhere. Early versions of Microsoft's cumulative patch didn't apply the final release code for XP customers running the latest version of Windows Update. After correcting this, Microsoft reissued its advisory on Sunday. The latest version of the bulletin is here.

Trojan wars

Last month Microsoft released a tool to clean up machines infected during last month's Download.Ject security flap. Users visiting a website contaminated with Download.Ject activated a script that downloaded a Trojan horse (called Berbew) from a website in Russia. This website was rapidly taken down but the underlying vulnerability in Internet Explorer used in the Download.Ject remained until last weekend despite the earlier availability of a workaround from Microsoft designed to limit the scope for mischief.

Redmond released these configuration changes earlier in July and followed up with a tool to remove variants of the Berbew Trojan from infected systems. Berbew (AKA Webber or Padodor) is capable of extracting passwords and login details from victims and forwarding this confidential data to crackers.

The risk posed by future Download.Ject-style attacks prompted security clearing house US-CERT to advise users to ditch IE for general web browsing, a call since repeated by other security experts. The seriousness of this warning - and the bad publicity it was getting because of the problem prompted Microsoft to break with its normal patch cycle in issuing a fix. Redmond normally issues patches on the second Tuesday of each month. ®

Related stories

Watch out! Incoming mass hack attack
Unpatched IE vuln exploited by adware
CERT recommends anything but IE
Microsoft half fixes serious IE vuln
IE workaround a non-starter
IE patch 'imminent'


Other stories you might like

Biting the hand that feeds IT © 1998–2022