Menu
New Internet Explorer zero-day details released after Microsoft fails to patch

New Internet Explorer zero-day details released after Microsoft fails to patch

The seven-month-old flaw has remained unpatched in Internet Explorer 8, which has a 20 percent market share

An older version of Microsoft's Internet Explorer browser has an unpatched software flaw that could allow rogue code to run on a computer, the second such flaw found in a month.

Microsoft was told of the flaw in October, which was discovered by Belgian researcher Peter Van Eeckhoutte, according to an advisory published Wednesday by HP's Zero Day Initiative (ZDI), a program that rewards security researchers for finding software flaws.

ZDI holds off publicly publishing information on a security flaw for up to six months so a software vendor can patch it. As that period came close to expiring, ZDI said it told Microsoft on May 8 that it intended to publish details of the flaw.

Microsoft's IE 8 browser, released five years ago, still holds a 20 percent share of the desktop browser market, according to statistics for April compiled by Net Applications. Microsoft officials couldn't be immediately reached for comment.

To exploit the vulnerability, an attacker would have to lure a potential victim to a website engineered to take advantage of the flaw, ZDI's advisory said. That could be accomplished by sending the victim an email or instant message that, if clicked, would lead to the attack. If the attack is successful, the hacker would have the same user rights on the computer as the victim.

ZDI wrote that the vulnerability is a "use-after-free" flaw, which involves the handling of CMarkup objects.

Earlier this month, Microsoft issued an emergency patch for a flaw that affected IE 6 through 11. The problem could allow attackers to execute code remotely on a compromised computer if the user views an infected Web page using the browser.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags MicrosoftHPExploits / vulnerabilities

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.‚Äč

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments