Microsoft Releases Long-Awaited Internet Explorer Patch

Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

SAN FRANCISCO -- Microsoft today released its security software patches for April, addressing an unpatched bug in Internet Explorer that hackers had been exploiting for several weeks.

As expected, the company released five patches, called "updates" in Microsoft parlance, addressing a number of critical vulnerabilities in IE and Windows. Microsoft also released an update for Outlook Express, rated "important," and a fix for Windows FrontPage Server Extensions and SharePoint Team Services 2002, rated "moderate." Here's a description of what Microsoft released.

In Microsoft's rating system, the most serious vulnerabilities are rated "critical," meaning they could allow unauthorized software to be installed without user action. The "critical" designation is followed by "important," and then "moderate."

Finally, the IE Patch

The most anticipated part of this month's update is the MS06-013 patch, which fixes several IE bugs, including the "create TextRange ()" vulnerability reported last month. Hackers had been exploiting this problem by installing unauthorized software on PCs accessed after tricking users into visiting sites that took advantage of the bug.

The problem was serious enough that security vendors eEye Digital Security and Determina created patches to address it. On Tuesday, eEye said that it had seen more than 156,000 downloads of its software, which Microsoft does not recommend.

Other Fixes

Microsoft also on Tuesday patched a similarly critical vulnerability in the way Windows Explorer handles Component Object Model objects. Attackers could take over a system by tricking users into visiting a Web site that would connect them to a remote file server. "This remote file server could then cause Windows Explorer to fail in a way that could allow code execution," Microsoft said.

This vulnerability affects all supported versions of Windows, Microsoft said.

The third critical fix in April's updates addresses a vulnerability in an ActiveX control, called RDS.Dataspace, which is distributed with the Microsoft Data Access Components. This software is included with the Windows operating system and is typically used by database software.

The RDS.Dataspace component problem is rated critical for Windows 98, Windows 2000, and Windows XP. It is considered a moderate risk for Windows Server 2003 users.

Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details.
Shop Tech Products at Amazon