Released as a MSI package, the patch is described as a workaround that leverages the Windows application compatibility toolkit to make a small change to MSHTML.DLL in memory every time the DLL is loaded by Internet Explorer. Microsoft previously recommended IE users to take this step manually, while the patch automates the task. Microsoft provides an installation guide for the workaround as well as information to uninstall the patch again.
Microsoft stressed that the workaround is only effective if all recent security updates for IE have been installed as well.
The company confirmed existing attacks that exploit the vulnerability. However, Microsoft said that "only 32-bit versions of Internet Explorer" are targeted and attacks "rely on third-party browser plugins to either perform efficient heap-spray in memory and/or to bypass the built-in mitigations of Windows Vista and 7 such as DEP and ASLR." However, users can further reduce the risk of a successful attack by updating their Java version from Java 6 to 7.
Contact Us for News Tips, Corrections and Feedback
bourgeoisdudeActually this was the first serious IE flaw in a long time. We have not had any virus's exploiting an IE flaw here at work since 2007. Flash player since 2010, Java seemingly every month (if only those website admins would stop using Java for their content...)
Micro$oft was made aware of a problem and came up with a patch. What else should they have done ?
It's not as if Firefox, Opera or Chrome are perfect; as a web developer I -have to- use all 4.
What buggers me far more that I can have a relatively simple page layout with a few tables and basic CSS and it still looks different on all 4 browsers. Try to explain that to a client !