A rendering bug

Published: 30 September 1999 y., Thursday
Microsoft_s Internet Explorer 5 (IE5) browser got hit with another one-two punch of coding bugs this week, as reports surfaced of a bug that allows documents to be stolen even through a firewall, and of the altering of HTML tags by the browser_s rendering engine. Security Expert Georgi Guninski, who has posted numerous reports of bugs and security issues with several Microsoft products, is warning users of a bug that would allow malicious hackers to steal and read data off of an IE5 machine, even through a firewall. The attack would take the form of HTML JavaScript that would be activated when a user visits an Internet site or through other means. Once activated, the JavaScript would then begin downloading files not out to another computer, which would be detected by a firewall, but rather back to the computer itself. This one is a spoofing attack. It downloads a file, and it downloads it from your computer to your computer. Once it_s downloaded the file from itself to itself, that information is downloaded to any IP address," said Steve Anderson, vice president of marketing at BigFix, a bug fixing service in Berkeley, Calif., which is assisting Guninski in warning users. "It_s kind of like a submit button on an HTML. The reason it can get through the security is cause it_s downloading to itself. Which it really shouldn_t be able to do," Anderson said. Microsoft is aware of the bug and has issued an alert at www.microsoft.com/security/bulletins/MS99-040faq.asp, which recommends that users disable the active scripting aspect of IE if they so desire. "We_re recommending as a work-around that customers who are worried about this vulnerability disable active scripting, while we develop a patch for this," said Scott Culp, security product manager on the security response team at Microsoft. Culp also stressed that the bug will not allow hackers to steal or alter information; they will only be able to read it. "The only thing that a Web site can do with this is read selected files from a users machine if they know the name of the file," Culp said. BigFix_s Anderson, however, said Microsoft_s advice belies the importance of the bug. Microsoft is currently working on a patch for the problem. Also this week, BugNet and its parent company KeyLabs, in Lindon, Utah, have confirmed the existence of a rendering bug with IE5 that could impact web developers.
Šaltinis: InfoWorld Electric
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Siebel Strengthens IBM, Microsoft Alliances

More than a year after it first revealed its "separate but equal" integration partnerships with Microsoft and IBM, Siebel says progress has been made in both endeavors more »

New Lawsuit Hits VeriSign and ICANN

A group of eight Internet domain name registrars has filed suit against the Internet Corporation for Assigned Names and Numbers (ICANN) and VeriSign more »

search.lt news

search.lt presents newest links more »

Bill Gates Outlines Technology Vision to Help Stop Spam

Microsoft Outlines Policy and Technical Proposals Aimed at Helping Contain The Spam Problem, Including the Development of Caller ID for E-Mail more »

Towards to the leading IT positions

Infobalt Association Starts OUTSOURCE2LITHUANIA Project more »

Hi-tech criminals target UK firms

British businesses are under siege by criminals and vandals using technology for financial gain or to cause havoc more »

The new services

HP points new weapons against virus, worm attacks more »

search.lt news

search.lt presents newest links more »

W3C adopts DARPA language

The Defense Advanced Research Projects Agency this month announced that the World Wide Web Consortium (W3C) approved a computer language based on DARPA Agent Markup Language (DAML) as an international standard more »

IBM to launch MS Office for Linux

Microsoft denies it is collaborating with Big Blue on Office migration more »