Internet Explorer continues to sprout new vulnerabilities, and attackers aren't wasting any time exploiting them. While Microsoft hasn't yet provided a patch, it has released the beta version of Windows Live, which could have security implications of its own.
Several new vulnerabilities have shown up lately in Microsoft's Internet Explorer browser. However, at the time of this writing, Microsoft has only addressed one of them—and minimally at that. This is the remote code execution threat I mentioned in my last article.
Redmond had yet to mention any of the other holes, and I really can't offer much advice other than increasing your general security stance—don't open attachments, don't visit strange Web sites, you know the drill. But keep in mind that with an ongoing threat, any of this could change at a moment's notice, so keep checking for new information.
For example, Microsoft updated its Security Advisory 917077 ("Vulnerability in the way HTML Objects Handle Unexpected Method Calls Could Allow Remote Code Execution") on March 24, 28, and 29. The last update included a link to Microsoft Security Advisory 912945 ("Non-Security Update for Internet Explorer"), which indicates that the upcoming security patch will include the ActiveX changes described in the advisory.
The threat covered by Security Advisory 917077 (CVE-2006-1359) affects IE 5.01 Service Pack 4 (on Windows 2000 SP4), IE 6 SP1 (on Windows 2000 SP4 and Windows XP SP1), IE 6 (on Windows XP SP2, Windows Server 2003, and Windows Server 2003 SP1, including Itanium and 64-bit versions), as well as IE 6 SP1 on older Windows versions (Windows 98, Windows 98 SE, and Windows ME). Microsoft says it will release a security bulletin for this threat.
Although this is a critical threat, antivirus software will mitigate the actual malware sent via this attack vector, so keeping antivirus software database signatures will help protect systems. The bad news is that antivirus tools only protect against known infections—but attackers can use the vulnerability in IE to install new malware if they stay ahead of new virus signatures.
Microsoft's delay in patching this critical actively exploited threat, which you can probably expect on April's Patch Tuesday, has caused several companies to release their own patches. However, remember that such fixes always carry a serious possibility of a malicious attack sneaking in under the guise of a patch. But that's not a condemnation of any particular third-party patch. If you know and trust one, you may wish to install it at your own risk.
Microsoft Lives it up
Microsoft's Windows Live Web site is now in beta. Even if you don't have the slightest interest in what this new offering can do, I recommend checking it out to get an idea of what Redmond has in mind. Parts of this initiative focus directly on business users, so—at least from a security standpoint—you need to be aware of it and the potential for problems.
The new suite of tools begins with Live.com, a news aggregator that's also a portal for those who want to integrate all of their Internet tools in one place. Live.com combines news, search, a toolbar that blocks pop-ups and warns of identity theft scams, e-mail, MSN Messenger (does anyone in business trust Messenger, by the way?), and other Live-specific offerings.
On the security front, Live OneCare provides virus and firewall protection, as well as backup tools. In addition, Live Safety Center runs tune-ups, cleans up files, and checks PCs for viruses and spyware. (Of course, most of these sites only work correctly with IE.)
A primary focus of Windows Live is to increase and facilitate online collaboration. While this will more than likely help boost productivity, keep in mind that such collaboration does have security implications.
Because Windows Live is currently in beta, there's simply no way to evaluate the potential threats posed from moving some of your company's collaboration. However, as a security professional, this is something you do need to keep in mind.
The IE vulnerability is critical. While there are several more out there that may be just as bad, no exploits have appeared in the wild yet. Microsoft needs to get a patch out for this threat ASAP.
As for Windows Live, I recommend checking it out because some of your users will more than likely do the same. Before they propose that the organization use it to collaborate, it's vital that you understand what threats it might pose. One strange aspect that I've noticed is that this tool, which emphasizes safety and performance, keeps trying to get me to download and install Macromedia Flash Player.
At this point, I can see a limited potential for cautious short-term business use of some of Windows Live's related features. I'll be further exploring this new offering in future articles.
Also watch for…
- In what's certain to be a boost for Linux, Microsoft has announced plans to host SuSE and Red Hat Linux versions in Virtual Server 2005 R2. It will be a free download that will allow multiple OSes to run on a single machine. (If readers of my TechRepublic blog were looking for more evidence that Microsoft faces big competition from UNIX, this announcement should prove that Redmond sees the potential of Linux.)
- In what's bound to be yet another potential headache for IT managers trying to keep bandwidth use down and productivity up, many of the large movie studios have announced plans to begin selling downloads of feature movies. And you thought downloading MP3 files was taking up a lot of employee time!
Miss a column?
Check out the IT Locksmith Archive, and catch up on the most recent editions of John McCormick's column.
Want to stay on top of the latest security updates? Automatically sign up for our free IT Locksmith newsletter, delivered each Tuesday!
John McCormick is a security consultant and well-known author in the field of IT, with more than 17,000 published articles. He has written the IT Locksmith column for TechRepublic for more than four years.