DonationCoder.com Forum

Main Area and Open Discussion => Living Room => Topic started by: lanux128 on February 01, 2011, 05:10 AM

Title: *URGENT* Patch IE security flaw (31 January 2011)
Post by: lanux128 on February 01, 2011, 05:10 AM
BBC ran this news about a "newly-discovered flaw in Windows that could be used by malicious hackers to steal private information or hijack computers". it seems that Microsoft has issued a software patch while a long-term fix is in the works. The patch can be found here (http://support.microsoft.com/kb/2501696).

[ You are not allowed to view attachments ] (http://www.bbc.co.uk/news/technology-12325139)

• http://www.bbc.co.uk/news/technology-12325139
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: mouser on February 01, 2011, 05:33 AM
Thanks for the heads up  :up:
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: fenixproductions on February 01, 2011, 07:04 AM
Published: January 28, 2011
-MS
It is always amazing for me to see how some news are picked up as "super new" when actually being few days old.

Or maybe other people just have life and not keep reading Internet all of their time ;)
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: Deozaan on February 01, 2011, 07:41 PM
Glad I don't use IE. Thanks for bringing this to our attention. :Thmbsup:
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: wraith808 on February 01, 2011, 09:32 PM
^ But do you have it on your machines?  Because of certain sites, I have to have it on my machine for work.  I don't actively use it unless I'm using those sites... but still it's there...
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: Deozaan on February 01, 2011, 10:27 PM
^ But do you have it on your machines?  Because of certain sites, I have to have it on my machine for work.  I don't actively use it unless I'm using those sites... but still it's there...

Yes, I have it on my machines, and there are certain websites (usually government ones!) that require IE to be used. That's why I'm glad it was brought to my attention.
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: Stoic Joker on February 01, 2011, 11:01 PM
From the MS Security Advisory (Mitigating Factors and Suggested Actions):

In a Web-based attack scenario, a Web site could contain a specially crafted link (MHTML:) that is used to exploit this vulnerability. An attacker would have to convince users to visit the Web site and open a specially crafted URL, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site, and then convincing them to click the specially crafted link.

So once again it's only those who blindly click away at anything that are (actually vulnerable) affected.

Microsoft Security Advisory (2501696) (http://www.microsoft.com/technet/security/advisory/2501696.mspx)
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: app103 on February 02, 2011, 03:58 AM
From the MS Security Advisory (Mitigating Factors and Suggested Actions):

In a Web-based attack scenario, a Web site could contain a specially crafted link (MHTML:) that is used to exploit this vulnerability. An attacker would have to convince users to visit the Web site and open a specially crafted URL, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site, and then convincing them to click the specially crafted link.

So once again it's only those who blindly click away at anything that are (actually vulnerable) affected.

Microsoft Security Advisory (2501696) (http://www.microsoft.com/technet/security/advisory/2501696.mspx)

My concern would be users of sites like Twitter, where shortened links are routinely used and you don't really know where they are going. Could one of these specially crafted links be shortened and then posted on Twitter with a catchy headline promising news about current events or other attractive content?
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: Stoic Joker on February 02, 2011, 06:50 AM
My concern would be users of sites like Twitter, where shortened links are routinely used and you don't really know where they are going. Could one of these specially crafted links be shortened and then posted on Twitter with a catchy headline promising news about current events or other attractive content?

Now, that is an interesting question... While I'd be inclined to say no - exploit should have no effect if sent to the wrong page processor - I'm not entirely sure. But I've always had an aversion stubby links.
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: wraith808 on February 02, 2011, 12:38 PM
My concern would be users of sites like Twitter, where shortened links are routinely used and you don't really know where they are going. Could one of these specially crafted links be shortened and then posted on Twitter with a catchy headline promising news about current events or other attractive content?

Now, that is an interesting question... While I'd be inclined to say no - exploit should have no effect if sent to the wrong page processor - I'm not entirely sure. But I've always had an aversion stubby links.

NPR had a talk with the head engineer (or some such title) at bit.ly.  She said that there was inbuilt protection against this, using a combination of whitelists/blacklists and heuristics... if a link is questionable (it's not in either of these lists) it goes to a list to be manually checked... but they only have 20 people *total* so there is a window where a potentially malicious link is waiting to be checked and in the wild.
Title: Re: *URGENT* Patch IE security flaw (31 January 2011)
Post by: Stoic Joker on February 02, 2011, 02:53 PM
My concern would be users of sites like Twitter, where shortened links are routinely used and you don't really know where they are going. Could one of these specially crafted links be shortened and then posted on Twitter with a catchy headline promising news about current events or other attractive content?

Now, that is an interesting question... While I'd be inclined to say no - exploit should have no effect if sent to the wrong page processor - I'm not entirely sure. But I've always had an aversion stubby links.

NPR had a talk with the head engineer (or some such title) at bit.ly.  She said that there was inbuilt protection against this, using a combination of whitelists/blacklists and heuristics... if a link is questionable (it's not in either of these lists) it goes to a list to be manually checked... but they only have 20 people *total* so there is a window where a potentially malicious link is waiting to be checked and in the wild.

Oh great, we're screwed...  :D