News

Cumulative Patch Ships for 3 Critical IE Flaws

More than a month after the Download.Ject vulnerability began exploiting a flaw in Internet Explorer, Microsoft fixed the underlying critical security vulnerability with a cumulative security patch over the weekend. The software giant urged customers to apply the update immediately.

Microsoft released security bulletin MS04-025 Friday evening and updated it on Sunday. The cumulative bulletin includes fixes for three vulnerabilities that are all public and are each critical on some version of IE.

Microsoft's patch is unusual in two respects that underscore its severity. It is only the third time since the company instituted a monthly patch cycle that it has released a bulletin outside of that schedule. One of the other times was last month, when the company released a workaround in advance of the actual patch for the flaw permitting Download.Ject. The other unusual aspect of the patch is that it includes fixes for Windows NT Workstation 4.0 Service Pack 6a and Windows 2000 Service Pack 2. Support for both of those platforms has been officially discontinued.

All three flaws can allow an attacker to take complete control of a user's computer over the Internet.

The one exploited by Download.Ject is called a navigation method cross-domain vulnerability. It is critical for IE 6 SP1 on any platform other than Windows Server 2003, IE 6 and IE 5.5 SP2. A flaw called the malformed BMP file buffer overrun is critical for IE 5.01 with service packs 2 through 4, IE 5.5 SP2 and IE 6. The third flaw, malformed GIF file double free vulnerability, is critical for all supported versions of Internet Explorer, including those running under Enhanced Security Configuration in Windows Server 2003.

The Download.Ject attack emerged in June. The attackers compromised Windows 2000 Web servers using versions of IIS 5.0 that hadn't been patched for an earlier vulnerability. Code appended to those compromised sites was used to compromise the flaw in IE that Microsoft hadn't yet patched.

View Microsoft's security bulletin:
www.microsoft.com/technet/security/bulletin/ms04-025.mspx.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • The 2021 Microsoft Product Roadmap

    From Windows 10X to the next generation of Microsoft's application server products, here are the product milestones coming down the pipeline in 2021.

  • After High-Profile Attacks, Biden Calls for Better Software Security

    Recent high-profile security attacks have prompted the Biden administration to issue an executive order aiming to tighten software security practices across the board.

  • With Hybrid Networks on Rise, Microsoft Touts Zero Trust Security

    Hybrid networks, which combine use of cloud services with on-premises software, require a "zero trust" security approach, Microsoft said this week.

  • Feds Advise Orgs on How To Block Ransomware Amid Colonial Pipeline Attack

    A recent ransomware attack on a U.S. fuel pipeline company has put a spotlight on how "critical infrastructure" organizations can prevent similar attacks.