Wednesday, December 17, 2008

Microsoft Emergency Patch For Internet Explorer

    Without the fix, hackers have the potential to access a computer's memory space, causing IE to exit unexpectedly, in a state that can be exploited.

    Microsoft is planning to release an out-of-band patch for Internet Explorer on Wednesday to address a critical security vulnerability that is being actively exploited.

    Millions of computers across the globe are threatened by a Trojan horse virus that could open them up to criminals, allowing access to personal and bank details.

    A major security flaw has been discovered in Microsoft's Internet Explorer
    web browser. Some two million computers are believed to have fallen victim after visiting apparently safe websites, but the contagion threatens to sweep the world wide web.

    Effectively, Trojan viruses are being injected into the software of millions of computers, allowing criminals to remotely access and operate them as if they were their own. Hackers in China are at the centre of the cyber attack, which is the most serious in the history of Microsoft's operating system.

    Since last Tuesday, Microsoft has updated its advisory four times. It expanded the list of potentially affected versions of Internet Explorer to include not only IE 7, but also IE 5.01 SP4, IE 6, IE 6 SP1, and IE 8 Beta 2. It also added several workaround options that involve disabling certain features.Microsoft however says it is aware only of attacks affecting Internet Explorer 7 under the following systems: Windows XP Service Pack 2, Windows XP Service Pack 3, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, Windows Vista, Windows Vista Service Pack 1, and Windows Server 2008.

    In a blog post on Tuesday titled "Stop Viewing Porn in Internet Explorer... For Now," Graham Cluley, senior technology consultant at Sophos, said that his company is seeing about 20,000 new infected Web pages appearing every day and that most of those sites are legitimate sites compromised by SQL injection attacks.

No comments:

Post a Comment