About Us | Contact Us
View Cart

A 6 year-old IE Vulnerability is Back!!

By Dan Hadaway | Wednesday, June 30, 2004 - Leave a Comment

There’s been another IE flaw brought back to the surface today. About 6 years ago there was a method an attacker could use to force their content to be shown in a frame of another site. This could allow an attacker to put their own login form into an online banking site for example, letting them harvest your username and password for your account. The issue was patched long ago, but the patch has evidently been undone.

This is mostly a reminder note. The issue in Internet Explorer that was exploited last week to infect a number of computers is still out there. Both the infected websites AND the vulnerability still exist. There isn’t a patch for it. All you have to do is browse a site with exploit code buried in it and your IE will install whatever they send you, you’ll have no indication something has happened.
This issue seems to be present again on fully patched systems. Normally this might not warrant an alert here, but the number of phishing scams that are out, we expect someone to exploit this. So if you’re using IE you might be at your own bank’s login but sending your information somewhere else.

This advisory is posted below. Your only protection is to not use Internet Explorer. We recommend Mozilla (www.mozilla.org), it’s a very good browser.

If you’re hooked on IE, never fear. We’re hearing rumors that MS may reconstitute the IE development team, presumably to begin addressing these security issues.

Original advisory:
————————-
TITLE:
Internet Explorer Frame Injection Vulnerability

SECUNIA ADVISORY ID:
SA11966

VERIFY ADVISORY:
http://secunia.com/advisories/11966/

CRITICAL:
Moderately critical

IMPACT:
Spoofing

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
http-equiv has discovered a 6 year old vulnerability in Microsoft
Internet Explorer, allowing malicious people to spoof the content of
websites.

The problem is that Internet Explorer fails to stop a malicious
website from loading arbitrary content in an arbitrary frame in
another browser window. An example has been posted, which shows
arbitrary content in a frame on windowsupdate.microsoft.com.

Successful exploitation allows a malicious site to load arbitrary
content, which appears to originate from a trusted site.

This vulnerability is similar to an old vulnerability fixed by
MS98-020 in Internet Explorer version 3 and 4.

The vulnerability has been confirmed in a fully patched Internet
Explorer 6 running on Microsoft Windows XP. Other versions of
Internet Explorer may also be affected.

SOLUTION:
Do not visit or follow links from untrusted websites.

Use another browser.

PROVIDED AND/OR DISCOVERED BY:
http-equiv

OTHER REFERENCES:
http://www.microsoft.com/technet/security/bulletin/ms98-020.mspx

Posted in Vulnerability News

Latest News
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! In the spirit of October and Halloween we have put together a gallery of our “spooky” Awareness Posters at halloween.infotex.com. Use them to help decorate for the holiday! Check […]
    With nearly three in four people using third-party payment services tied to their bank accounts, the risk isn’t limited to your own policies and procedures… An article review. When working on cybersecurity awareness messages for your customers you may be inclined to focus on your own systems, but a new study on security in digital […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex is excited to announce that Cody Smith has joined the team as the newest Data Security Analyst. Cody holds several industry certifications (including the most recent: SSCP) as well as a B.S in Cyber Security & Information Assurance from Western Governors University. […]
    It’s all about protecting Customer information . . . In 1999 the Gramm-Leach-Bliley Act (GLBA) directed the Federal Deposit Insurance Corporation (FDIC) and other federal banking agencies to ensure that financial institutions have policies, procedures, and controls in place to prevent the unauthorized disclosure of customer financial information.  The FDIC and other federal banking agencies […]
    A Ghoulish Gallery! Just a few scary-themed Awareness posters from our collection, which you can see at posters.infotex.com! Below you will find both the vertical and horizontal versions of each of the posters, all you need to do is “right-click > “Save link as…” to download! Vertical 8.5″ x 11″ Format   Horizontal 11″ x […]
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    With the potential to break all existing forms of encryption, quantum computing poses a unique challenge… An article review. While quantum computing has been a buzzword for some time now the technology remains largely theoretical, with small scale proofs-of-concept that still suffer from serious limitations.  That hasn’t stopped security researchers from worrying about the technology’s […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]