About Us | Contact Us
View Cart

A 6 year-old IE Vulnerability is Back!!

By Dan Hadaway | Wednesday, June 30, 2004 - Leave a Comment

There’s been another IE flaw brought back to the surface today. About 6 years ago there was a method an attacker could use to force their content to be shown in a frame of another site. This could allow an attacker to put their own login form into an online banking site for example, letting them harvest your username and password for your account. The issue was patched long ago, but the patch has evidently been undone.

This is mostly a reminder note. The issue in Internet Explorer that was exploited last week to infect a number of computers is still out there. Both the infected websites AND the vulnerability still exist. There isn’t a patch for it. All you have to do is browse a site with exploit code buried in it and your IE will install whatever they send you, you’ll have no indication something has happened.
This issue seems to be present again on fully patched systems. Normally this might not warrant an alert here, but the number of phishing scams that are out, we expect someone to exploit this. So if you’re using IE you might be at your own bank’s login but sending your information somewhere else.

This advisory is posted below. Your only protection is to not use Internet Explorer. We recommend Mozilla (www.mozilla.org), it’s a very good browser.

If you’re hooked on IE, never fear. We’re hearing rumors that MS may reconstitute the IE development team, presumably to begin addressing these security issues.

Original advisory:
————————-
TITLE:
Internet Explorer Frame Injection Vulnerability

SECUNIA ADVISORY ID:
SA11966

VERIFY ADVISORY:
http://secunia.com/advisories/11966/

CRITICAL:
Moderately critical

IMPACT:
Spoofing

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
http-equiv has discovered a 6 year old vulnerability in Microsoft
Internet Explorer, allowing malicious people to spoof the content of
websites.

The problem is that Internet Explorer fails to stop a malicious
website from loading arbitrary content in an arbitrary frame in
another browser window. An example has been posted, which shows
arbitrary content in a frame on windowsupdate.microsoft.com.

Successful exploitation allows a malicious site to load arbitrary
content, which appears to originate from a trusted site.

This vulnerability is similar to an old vulnerability fixed by
MS98-020 in Internet Explorer version 3 and 4.

The vulnerability has been confirmed in a fully patched Internet
Explorer 6 running on Microsoft Windows XP. Other versions of
Internet Explorer may also be affected.

SOLUTION:
Do not visit or follow links from untrusted websites.

Use another browser.

PROVIDED AND/OR DISCOVERED BY:
http-equiv

OTHER REFERENCES:
http://www.microsoft.com/technet/security/bulletin/ms98-020.mspx

Posted in Vulnerability News

Latest News
    How Do We Know What We Know? Making Sure You Can Understand What Happened in an Incident. Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Until I reclined on my front yard, looking at the sky, following the instructions on how not to look […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    President Biden recently signed a bill tasking the agency with evaluating the unique risks that schools face… An article review. Taking note of the unique challenges educational institutions face in securing their networks, President Biden has signed a bill into law directing the Cybersecurity and Infrastructure Security Agency (CISA) to look into ways that they can […]
    Thanks for being interested in our Technology Planning Webinars! This year‘s annual update to our annual Technology Planning webinar will include a panel discussion, a review of the previous years’ movies that are already available, and a discussion about alternative tactics that have arisen from recent conferences as well as the impact of the AIO […]
    Welcome Cybersecurity Conference Attendees! Thanks for joining us for the Cybersecurity Conference today! We have created this page for you to have access to the deliverables from Dan’s talk.  
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]