Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Corsair H170i Elite Capellix XT review
Forspoken: PC performance graphics benchmarks
ASRock Z790 Taichi review
The Callisto Protocol: PC graphics benchmarks
G.Skill TridentZ 5 RGB 6800 MHz CL34 DDR5 review
Be Quiet! Dark Power 13 - 1000W PSU Review
Palit GeForce RTX 4080 GamingPRO OC review
Core i9 13900K DDR5 7200 MHz (+memory scaling) review
Seasonic Prime Titanium TX-1300 (1300W PSU) review
F1 2022: PC graphics performance benchmark review

New Downloads
FurMark Download v1.33.0.0
Intel ARC graphics Driver Download Version: 31.0.101.4091
Corsair Utility Engine Download (iCUE) Download v4.33.138
CPU-Z download v2.04
AMD Radeon Software Adrenalin 23.1.2 (RX 7900) download
GeForce 528.24 WHQL driver download
Display Driver Uninstaller Download version 18.0.6.0
Download Intel network driver package 27.8
ReShade download v5.6.0
Media Player Classic - Home Cinema v2.0.0 Download


New Forum Topics
What reason to go to Windows 11? AMD Ryzen 7 7700X sees price drop to $299 Microsoft Now Is Proactively Informing Windows 10 users to update to Windows 11 Forspoken Benchmark Test & Performance Analysis Review Netflix threatens to ban customers who share an account unauthorized AMD Software: Adrenalin Edition 22.11.2 - Driver download and discussion Amernime Zone AMD Software: Adrenalin / Pro Driver - Release Discovery 22.12.2 WHQL CORSAIR introduces the new VENGEANCE a8100 and i8100 gaming PCs NVIDIA GeForce 528.24 WHQL driver download & Discussion We need to talk about UE4 Shader compilation issues




Guru3D.com » News » IE Zero day Vulnerability. Work arounds available.

IE Zero day Vulnerability. Work arounds available.

by Watcher on: 12/15/2008 07:29 AM | source: | 0 comment(s)

Microsoft issued a security advisory with workarounds for dealing with hacker attacks targeting a zero-day flaw in Internet Explorer 7. Users await word as to when to expect a patch or an update to fix the IE 7 browser security issue.

Microsoft has issued an advisory to help users deal with a zero-day flaw affecting Internet Explorer.

In an update, Microsoft stated the flaw affects not only Internet Explorer (IE) 7 as originally thought, but also versions 5 and 6. However, as of Dec. 11, Microsoft had only seen attacks against IE 7. "The vulnerability exists as an invalid pointer reference in the data binding function of Internet Explorer," according to Microsoft. "When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, leaving the potential to access the deleted object's memory space. This can cause Internet Explorer to exit unexpectedly, in a state that is exploitable."

The vulnerability itself is a memory corruption error in the handling of DHTML data bindings. The attacker does a "heap spray" and then an invalid pointer dereference in an array of data binding objects. They don't exactly give proof of concept code, but this is more than they usually say.

The workarounds fall into three classes, those that:

    (A) block access to the vulnerable code in MSHTML.dll via OLEDB, protecting against current attacks
    (B) apply the most secure configuration against this specific vulnerability.
    (C) make it much harder to heap spray.

Workaround A B C
1. Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones
X X
2. Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
X X
3. Restrict Internet Explorer from using OLEDB32.dll with an Integrity Level ACL X

4. Disable Row Position functionality of OLEDB32.dll X

5. Unregister OLEDB32.DLL X

6. Use ACL to disable OLEDB32.DLL X

7. Enable DEP for Internet Explorer 7 on Windows Vista and on Windows Server 2008

X
8. Disable Data Binding support in Internet Explorer 8 X X

The (A) workarounds, are more desirable because they disable the least functionality, and some of them are very targeted. The (B) workarounds, if you ask me, may be necessary but are undesirable. Breaking scripting breaks a lot of software and prompting for it is of dubious value because users won't know which prompts to say yes to. The only (C) entry that's really interesting is to enable DEP and you should do that irrespective of this issue. Microsoft recommends one from column (A) and, to be really comprehensive, one from column (B). I guess they have to say this.

More here.







« The Dark Knight selling 600,000 Blu-ray copies in first week · IE Zero day Vulnerability. Work arounds available. · AMD Athlon X2 7750 BE review [Guru3D] »


Guru3D.com © 2023