Microsoft has announced that it is currently testing a patch for an IE6 and IE7 flaw after the exploitation code was made public by Israeli security researcher Moshe Ben Abu. Though the next Patch Tuesday is not until early April, Microsoft's Jerry Bryant said the release of the code means there would likely be a patch before then.
"We have seen speculation that Microsoft might release an update for this issue out-of-band," Bryant, a senior communications manager with the Microsoft Security Response Center (MSRC) wrote in a blog post. "I can tell you that we are working hard to produce an update which is now in testing," he said, adding, " This is a critical and time intensive step of the process as the update must be tested against all affected versions of Internet Explorer on all supported versions of Windows."
Microsoft warned users of the vulnerability last week, only to have research Moshe Ben Abu release the exploitation code the next day. The vulnerability is said to exist due to an invalid pointer reference being used within IE. MS says it is possible for the invalid pointer to be accessed after an object is deleted.
"In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution," Microsoft said in its advisory.
Microsoft has released an automated workaround but the Fix It is only effective for users running Windows XP and Windows Server 2003.
Stay on the Cutting Edge
Join the experts who read Tom's Hardware for the inside track on enthusiast PC tech news — and have for over 25 years. We'll send breaking news and in-depth reviews of CPUs, GPUs, AI, maker hardware and more straight to your inbox.
I thought IE6 was put to pasture..Reply
IE6? Is it still alive and well? I thought it would have faded away by now.Reply
I thought IE6 support was done away with??Reply
I know a faster patch: upgrade to IE8 or better yet, get Firefox.Reply
Even if you don't use IE, MS has the browser tied to the OS at the kernel level, scary. Another reason to use Linux or a Mac.Reply
Kernel level attachment gives the FEDS their back door to your computer.Reply
I understand a little about code execution and pointers and data structures/tables ect from back in high school, but what exactly does "remote code execution" mean?Reply
In my circle of friends it's mostly just twisted around into a dirty joke...
Bill: "I'll remotely execute YOUR code!"
Ted: "I'll remotely execute your MOM'S code!"
Bill: "I'm gonna remotely execute YOUR FACE right now!"
Admin: "If you two don't calm down, I'll remotely execute all your base, then lock and sticky this as an example of why today's games all cater towards console kiddies!!!"
In other news: The only way to fix IE is to change to Firefox or Chrome. Any other method is avoiding the fact that IE is just an awful browser.Reply
NapoleonDKI understand a little about code execution and pointers and data structures/tables ect from back in high school, but what exactly does "remote code execution" mean?"Reply
Remote Code Execution: Someone is running code on your computer through another computer/network/system. So they can run what they want on your computer without sitting in that chair, that's all it is.
brendano257...that's all it is.Appreciate it man, have a nice one. +1Reply
So say someone has this remote capability, what are they gonna do with it? What's the goal? Initiate file transfer/download botnet client? And why do people pursue vulnerabilities like this? Is there money in it for them? Or are they just doing it to be a pain in the nethers?