Microsoft this week fixed a widely reported flaw in its Internet Explorer (IE) browser that had been used by attackers over the past few weeks to take over the PCs of unsuspecting users. The flaw was one of four IE bugs fixed Tuesday in Microsoft's regularly scheduled software update, which also addressed some problems caused by Sony's XCP copy protection software.
Although attacks based on the vulnerability have not been widespread, it is important that IE users now install the patch, said Neel Mehta, team lead of Internet Security Systems' X-Force group. "It's not of epic proportions," he said. "But isolated attackers here and there have used it to install malware."
Security experts had known about the flaw since May, but on November 21 hackers with a U.K. organization called Computer Terrorism posted sample code that showed it to be much more serious than originally thought. Within days that sample code was adapted and being used by attackers, prompting many security experts to erroneously predict that Microsoft would rush a patch ahead of its December update.
Like the rest of the world, Microsoft had not realized that the IE bug could be used to run unauthorized software until the Computer Terrorism code was posted, Toulouse said.
At that point, the company evaluated the potential threat posed by the malware against the possibility of releasing a buggy patch and decided to include fix the problem within an IE update that had already been in the works for December.
Microsoft fixed this problem, along with the other three IE bugs, in one of two security updates, released Tuesday. More details on the IE fixes can be found in the MS05-054 Security Bulletin here. This update is rated "critical" by Microsoft.
Addresses Sony Issue
With Tuesday's software release, Microsoft has also taken steps to mitigate the danger associated with Sony's Extended Copy Protection (XCP) digital rights management software. Sony was forced to recall millions of CDs in November after a series of blunders that related to this program. Because of its use of "rootkit" techniques normally associated with spyware or viruses, XCP itself was considered spyware by many security vendors. And Sony's XCP uninstaller installed a buggy ActiveX control that could be used by attackers to take over a user's PC.
As planned, Microsoft has now updated its Malicious Software Removal Tool to disable XCP's rootkit features and identify and remove a malicious Trojan program that takes advantage of the rootkit's cloaking techniques, Toulouse said.
The IE security update also includes software that disables the Sony's buggy ActiveX control. "With Sony's permission, we're preventing that ActiveX control so you can't be attacked," Toulouse said.
Kernel Fix Included
A second update, assigned Microsoft's less severe security rating of "important," fixes a problem in the Windows 2000 kernel. That update can be found here. This bug could help an attacker to circumvent Microsoft's user privileges mechanism and perform unauthorized tasks on a PC.
Typically, this flaw could not be exploited remotely, as it requires that the attacker gain access to the targeted computer's keyboard, said Steve Manzuik, security product manager with the company that discovered the bug, eEye Digital Security. Its advisory may be read here.