New Internet Explorer 0-day exploit
Reports are coming out of a new security flaw in Microsoft Internet Explorer 7 which is, as yet, unresolved by the geeks in Seattle. In typical Microsoft style, their Security Advisory says that this “only” affects “supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, Windows Vista, Windows Vista Service Pack 1, and Windows Server 2008.” They go on to say it may affect older and newer versions of Internet Explorer too so be warned. Of course, what they won’t say is that the safest solution for now is to switch to another browser package, such as Firefox.
Microsoft go onto say that “Our investigation of these attacks so far has verified that they are not successful against customers who have applied the workarounds listed in this advisory.” I have read this article and I cannot find ANY specific “workarounds’ described in the advisory which apply to end users. Are Microsoft serious ? Why do they persist in pushing politically-awkward, misdirecting legalese on an unsuspecting public ?
The flaw allows certain scripts or software on malicious websites to obtain information from the PC which is successfully attacked. There is a list of websites which may include code – either by design or unwittingly to the website owners – which may exploit this flaw. You can find it here on the shadowserver.org site. IT Administrators can safely put this list into any blocking rules on a proxy server / firewall, and home users can also paste te list into their ADSL modem/router if it has this web-site blocking functionality.