Researchers have discovered two new vulnerabilities present in Microsoft’s dominant Internet Explorer browser, one of which has been rated by security experts as critical. Both vulnerabilities affect the Version 6.0 iterations of the browser.
According to virus watchers at the SANS Institute’s Internet Storm Center, the flaws were reported to its Full-Disclosure mailing list along with related proof-of-concept code. However, the organization said it has not yet received any reports of the vulnerabilities being exploited in the wild.
Researchers described one of the glitches, which is capable of allowing so-called cross-site scripting attacks, as a critical vulnerability, the organization’s most serious rating for emerging threats.
The other flaw was ranked by virus experts at security firm Secunia, in Copenhagen, Denmark, as “less critical,” the second-least serious ranking out of five assigned to such glitches under Secunia’s system.
Microsoft officials did not offer any further comment on the security issues, but SANS, in Washington, reported that the software giant was aware of the problems and researching their potential impact.
According to SANS, the more serious Internet Explorer vulnerability can be exploited via the use of certain HTML applications designed to trick users into opening a file by double-clicking on it. The questionable file has to be accessible through the software’s SMB or WebDAV (Web-based Distributed Authoring and Versioning) protocols, and can be located on a remote Web site.
Researchers said the proof-of-concept attack they were sent is limited in scope based on the fact that it requires the user to click on an icon to execute any potentially malicious payload, but the organization said it expects to unearth “creative use” of the exploit in the wild “very soon.”
One suggested workaround for the problem is to disable Internet Explorer’s active scripting capabilities altogether.
The second, less harmful vulnerability is related to the Web browser’s handling of a specific type of HTML property in the software. SANS said abuse of this property could allow an attacker to retrieve content remotely when a Web page is viewed by a user.
Read the full story on eWEEK.com: SANS Spots New IE Vulnerabilities
Feeling stuck in self-doubt?
Stop trying to fix yourself and start embracing who you are. Join the free 7-day self-discovery challenge and learn how to transform negative emotions into personal growth.