This article is more than 1 year old
XP SP2 über patch already needs fixing
Active Scripting still the cracker's best friend
The first new vulnerability affecting Internet Explorer on Windows XP with SP2 has been discovered
The vulnerability allows malicious websites to place an executable file in a user's start-up folder when a user drags or clicks on a program masqueraded as an image. http-equiv of malware.com, a so-called White Hat hacker, has posted a sample exploit which demonstrates security weaknesses in the drag and drop function of IE that give rise to the exploit.
Even though this demo depends on the user performing a drag and drop event, it might be rewritten so a user need only perform a single click on an image instead, according to security firm Secunia.
The vulnerability has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP1/SP2. Users of IE 5.5 and 5.01 are also affected.
Secunia says the "highly critical" vuln could be exploited by attackers to obtain full system access to vulnerable systems. Microsoft has yet to issue a patch, but workarounds are available. Secunia advises users to disable Active Scripting or use an alternative browser to protect themselves from attack. ®
Related stories
CERT recommends anything but IE
Long-awaited IE patch (finally) arrives
200 apps clash with XP SP2
Corporates can delay XP SP2 auto-update
WinXP SP2: stop moaning and get downloading