[Am-info] Microsoft Internet Explorer Multiple Vulnerabilities - AGAIN!!
Fred A. Miller
fmiller@lightlink.com
Wed, 20 Aug 2003 17:38:40 -0400
Microsoft Internet Explorer Multiple Vulnerabilities
TITLE:
Microsoft Internet Explorer Multiple Vulnerabilities
READ ONLINE:
http://www.secunia.com/advisories/9580/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
=46rom remote
SOFTWARE:
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
DESCRIPTION:
Microsoft has issued a cumulative patch which fixes multiple
vulnerabilities. The worst could lead to execution of arbitrary code
on the client system via HTML emails or web sites.
1) A cross domain vulnerability exists in the way Internet Explorer
retrieves files from the cache. This could be exploited by a malicous
HTML document to execute arbitrary scripting in the "My Computer
Zone".
2) Internet Explorer does not properly determine object types. This
could possibly be exploited by malicious HTML documents to execute
arbitrary code.
3) The Kill Bit is will be set on the Windows Reporting Tool ActiveX
control "BR549.DLL". This ActiveX control contains a vulnerability
which could be exploited by malicious HTML documents to execute
arbitrary code.
=46urthermore, a language specific variant of the older object type tag
buffer overflow vulnerability (MS03-020) has been identified and is
fixed in this patch.
This update also fixes other minor issues.
SOLUTION:
The patch is available from
http://windowsupdate.microsoft.com/
or=20
http://www.microsoft.com/windows/ie/downloads/critical/822925/default.asp
REPORTED BY / CREDITS:
Yu-Arai, LAC
eEye Digital Security
Greg Jones, KPMG UK
ORIGINAL ADVISORY:
http://www.microsoft.com/technet/security/bulletin/MS03-032.asp
=2D-=20
"...Linux, MS-DOS, and Windows XP (also known as the Good, the Bad, and
the Ugly)."