Internet Explorer Vulnerability And Temporary Fix
Another Internet Explorer vulnerability was disclosed yesterday by Microsoft. All Internet Explorer versions from Internet Explorer 5.01 to 8 are affected on all Microsoft operating systems.
A mitigating factor on Windows Vista and later operating systems (like Windows 7) prevents the exploitation of the vulnerability in Internet Explorer 7 and Internet Explorer 8 if protected mode is enabled in the web browser. Protected mode is enabled by default in those browsers but can be turned off by system administrators.
That leaves Windows XP as the main target of the vulnerability . It can be exploited to read files from the operating system if the filename and path are known.
The vulnerability exists due to content being forced to render incorrectly from local files in such a way that information can be exposed to malicious websites.
Microsoft states that it is unaware of attacks being carried out that target the vulnerability
At this time, we are unaware of any attacks attempting to use this vulnerability. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
Microsoft provides four temporary solutions to protect a computer system from the Internet Explorer vulnerability. Solution four is probably the easiest and most convenient solution at this moment.
Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones
To raise the browsing security level in Internet Explorer, follow these steps:
1. On the Internet Explorer Tools menu, click Internet Options.
2. In the Internet Options dialog box, click the Security tab, and then click the Internet icon.
3. Under Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.
Note If no slider is visible, click Default Level, and then move the slider to High.
Note Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.
Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.
To do this, follow these steps:
1. In Internet Explorer, click Internet Options on the Tools menu.
2. Click the Security tab.
3. Click Internet, and then click Custom Level.
4. Under Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.
5. Click Local intranet, and then click Custom Level.
6. Under Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.
7. Click OK two times to return to Internet Explorer.
Note Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.
Enable Internet Explorer Network Protocol Lockdown for Windows XP
To lockdown the â€œfileâ€ protocol, paste the following text in a text editor such as Notepad. Then, save the file by using the .reg file name extension.
Windows Registry Editor Version 5.00
Enable Internet Explorer Network Protocol Lockdown using automated Microsoft Fix It [link]
System administrators can take a look at the vulnerability information page for further information about and impact of the vulnerability.Advertisement