News

Use 'Protected Mode' To Secure IE 7, Microsoft Says

A setting in Internet Explorer 7 running on Windows Vista can help stave off a particular remote code execution attack, according to Microsoft's security team.

The setting, called "protected mode IE," runs IE 7 with lower privileges. It thwarts a vulnerability outlined in Microsoft's MS09-019 security bulletin, which was issued this week as part of Redmond's June security patch. Microsoft's security team outlined what IT pros should check in a blog post on Tuesday.

To avoid potential attacks, IE privileges at the highest level should be restricted in the browser. Such browser security is only enabled with the user account control (UAC) setting turned on. If either UAC or protected mode IE is turned off, the system could be vulnerable, the security team explained.

Right now, protected mode IE only applies to IE 7 on Windows Vista. However, it likely will be a continued as a feature in IE 8 for Windows 7, according to Microsoft's security team.

Even with protected mode IE, Microsoft recommends applying the MS09-19 patch. IE is the most used Web browser, so it's important to patch, security experts say.

"One of the high-profile bugs fixed in this recent patch release was discovered at the CanSecWest PWN2OWN competition," explained Andrew Storms, director of security at nCircle. "Client-side, browser-based vulnerabilities continue to top the charts for threats. So every user should put this patch at the top of their 'install immediately' list."

The bug described at CanSecWest reportedly made short work of Microsoft's data execution prevention function in IE 8, as well as its address space layout randomization technology.

Don Leatham, senior director of solutions and strategy at Lumension, intimates that there are larger issues at stake to ensure secure Web surfing.

"In the recent [patch] release, [there were] seven separate vulnerabilities across Internet Explorer 6 and 7 for both XP and Vista. And this means that almost all Windows users will soon be vulnerable while browsing the Web," Leatham said.

What's being patched is "the DHTML and HTML object handling capabilities of Internet Explorer, the core technologies in almost every Web page -- and that's big," Leatham added.

Microsoft provides more information about protected mode IE here.

On top of that, Microsoft's security team also described a "network protocol lockdown" configuration for IE that can be used as a workaround to restrict HTML content sent via certain protocols.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • Microsoft Appoints Althoff as New CEO for Commercial Business

    Microsoft CEO and chairman Satya Nadella on Wednesday announced the promotion of Judson Althoff to CEO of the company's commercial business, presenting the move as a response to the dramatic industrywide shifts caused by AI.

  • Broadcom Revamps VMware Partner Program Again

    Broadcom recently announced a significant update regarding its VMware Cloud Service Provider (VCSP) program, coinciding with the release of VMware Cloud Foundation (VCF) 9.0, a key component in Broadcom’s private cloud strategy.

  • Closeup of the new Copilot keyboard key

    Microsoft Updates Copilot To Add Context-Sensitive Agents to Teams, SharePoint

    Microsoft has rolled out a new public preview for collaborative "always on" agents in Microsoft 365 Copilot, bringing enhanced, context-aware tools into Teams channels, meetings, SharePoint sites, Planner workstreams and Viva Engage communities.

  • Windows 365 Cloud Apps Now Available for Public Preview

    Microsoft announced this week that Windows 365 Cloud Apps are now available for public preview. This aims to allow IT administrators to stream individual Windows applications from the cloud, removing the need to assign Cloud PCs to every user.