Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Internet Explorer The Internet Bug Security

New IE Holes Discovered 801

joelt49 writes "Yahoo! News is reporting that 7 new security holes for Internet Explorer have been discovered by a Chinese researcher; however, there apparantly aren't any attacks on IE yet." The part about this story that gets to me is that the researcher didn't alert Microsoft before posting to a public mailing list. Sure, a lot of people don't like Microsoft, but that's no reason to make it worse for the millions of people who are forced to use Microsoft products, especially for security holes which have yet to be exploited.
This discussion has been archived. No new comments can be posted.

New IE Holes Discovered

Comments Filter:
  • by Lieutenant_Dan ( 583843 ) on Saturday November 29, 2003 @10:15AM (#7587015) Homepage Journal
    Russ Cooper made some good points [ntbugtraq.com].

    I think MS has the responsibility to address their customers concerns immediatelly (naive, I know), especially IE's overly close integration with the OS which causes most of these exploits.
  • by Anonymous Coward on Saturday November 29, 2003 @10:19AM (#7587037)

    half the exploits don't work (latest WinXP), the remote exploits doesn't , and the rest require physical local access which sort of negates security on a windows box

    this isnt news
    at least not to those who are on the lists who see this "hackers" postings on a regular basis

  • Addendum (Score:4, Informative)

    by Lieutenant_Dan ( 583843 ) on Saturday November 29, 2003 @10:21AM (#7587043) Homepage Journal
    I like this release [secunia.com].

    Disable Active Scripting and find an alternative to IE ("use another product"). Not very realistic unfortunately, when companies have invested so much in integrating (and accepting) some of the flawed functionality in IE.

    I do find that people are starting to be a lot more receptive towards MS-alternatives, especially when the mass media is now jumping on the bandwagon as well. Now techies find themselves explaining their choice of MS over and over again, to hype-induced managers.
  • Re:Forced? (Score:3, Informative)

    by haxor.dk ( 463614 ) on Saturday November 29, 2003 @10:28AM (#7587087) Homepage
    Sorry to burst your bubble, but:

    1) There are virtually no "integration" issues between Mac OS X and Windows. OS X supportes Samba out of the box.

    2) I thought most companies frowned upon games on company computers , on company time ?
  • by the_mighty_$ ( 726261 ) on Saturday November 29, 2003 @10:30AM (#7587093)
    hey folks, this was posted to bugtraq some two months ago [securityfocus.com].
  • Microsoft has claimed time and again that their response times to security alerts are sterling, as opposed to the "slow" response times for OSS. They make these claims without telling consumers that they have known about the exploit for months and are publicly releasing knowledge right before they release the fix.

    This is a case of people letting Microsoft's boastful ways catch up to it. If they are as fast as they have claimed, time and again, there won't be a problem for those people who are diligent in patching.

    Additionally with the advent of companies using the DMCA to try and stifle this behavior, it is more important than ever to engage in it and further show the flaws with this absolutely off the wall piece of legislation. See this [slashdot.org] article.

  • by Troed ( 102527 ) on Saturday November 29, 2003 @10:34AM (#7587103) Homepage Journal
    Neither does Microsoft, as shown several times when their updates causes 3rd software to break - even in areas the patch wasn't supposed to touch.

    Feel free to Google.
  • by twitter ( 104583 ) on Saturday November 29, 2003 @10:55AM (#7587197) Homepage Journal
    No one is forced to use IE with very few exceptions:

    Not true, Microsoft makes it very difficult to use anything but Microsoft junk. The first level of anoyance is a barage of scary warning messages about "signed code". Then there are constant anoyance messages which require confirmation and include the option you don't want. In time, you will push the wrong button. Finally, Microsoft breaks other programs on their platform. My little brother uses XP and keeps it "up to date" by accepting whatever M$ pushes at him. It broke Mozilla. I consider that a force.

    The only way to avoid all of that harassment and the insecurity that it creates is to leave M$ completely. If you still think it takes a lot of effort, you need to play with Knoppix. The only trouble you might have is with winmodems and other nastier hardware which does not work well under windblows either. It's easier for indiviuals to install and way easy for technicians. It's good for individual users and far superior for business.

    There's probably someone near you who will do an install for less than the Windblows install going rate. Just google your town name with "free software", Linux and other likely terms. Hungry geeks, such as myself, will happily come to your house for $40 and set you up. Businesses will pay by the hour but save hundreds per machine and employee every year.

  • by puck01 ( 207782 ) * on Saturday November 29, 2003 @11:04AM (#7587246)
    I wrote this above and I"ll post it again, using an alternate browser does not always protect you from IE holes. I cannot comment on these new holes because I'm not sure how they work, but some previous IE holes left the computer vulnerable whether or not you actually used IE at all! An unfortunate consequence of the browser integration with the OS.

    So the fact that I'm using Mozilla on Win 98 right now, doe not mean I'm guarenteed immunity from these new holes.
  • No Exploit, eh? (Score:5, Informative)

    by GaelenBurns ( 716462 ) <gaelenb@assuranc ... es.com minus bsd> on Saturday November 29, 2003 @11:08AM (#7587272) Homepage Journal
    What I'm wondering is why the poster of this story didn't do a tad more research before posting. As of yesterday, an exploit for these security holes has been available.

    Exploit code, anyone? A simple google search or a Bugtraq archive browse should do it.
  • by Begemot ( 38841 ) on Saturday November 29, 2003 @11:11AM (#7587286)
    ... as shown several times when their updates causes 3rd software to break ...

    It's even worse when done by design [winntmag.com]. Once a scoundrel - always a scoundrel.
  • by Error27 ( 100234 ) <error27.gmail@com> on Saturday November 29, 2003 @11:22AM (#7587340) Homepage Journal
    These security problems were publically known in September. [secunia.com]

    What was released recently was sample exploit code.

    If you are a Microsoft spokesman then, of course, you have to say that, "Hey, if we don't have a fix then it must mean we didn't know about it." So it's not even lying to say that you weren't told. It's the only logical thing.

    The spokesman was not aware that Microsoft had released unmarked patches [ntbugtraq.com] for some of the problems.

  • by Anonymous Coward on Saturday November 29, 2003 @11:40AM (#7587443)
    you want to use inferior and crappy microsoft products ? go on
    and dont cry if they're full of holes and you get hacked/cracked/whatever
    you made a choice by keeping with them
    you get what you deserve
  • by Vlad_the_Inhaler ( 32958 ) on Saturday November 29, 2003 @12:05PM (#7587537)
    That brings back an old memory!

    Way back when I was getting my degree, one of the lecturers had implemented this interpretive language called Codil (COntext Dependent Information Language) in Cobol. It was apparently really good at solving certain types of problems, but one of it's own problems was that the interpreter partially depended on some bugs in that one particular Cobol compiler. When Bugfixes were applied, the author needed a description of the fixes so he could track down the problems they were causing his interpreter.

    Another problem will have been that the hardware he used was an ICL 1900 - a 24-bit machine with 6-bit bytes and whose successor (the ICL 2900, I think) was totally incompatable to it. ICL was taken over by Fujitsu some time in the 80's.

    Google has quite a few pointers Codil but they all appear to be historical.
  • by Baki ( 72515 ) on Saturday November 29, 2003 @01:36PM (#7587963)
    In the company where I work (a large bank, 40000 work places) the latest IE security patch caused grave problems with (client certificate authenticated) SSL connections. Many internal applications broke down at random after about 10 minutes. This is costing massive amounts of time and money.
  • by theancient2 ( 527101 ) on Saturday November 29, 2003 @02:57PM (#7588365)
    I believe there are a few issues the Mozilla people need to address before their browser will be widely accepted by the general population. I'm not talking about people like you and me, I'm talking about people like my mother.

    For example, install Mozilla, and all your Favourites disappear. They're probably buried in the Bookmarks menu somewhere (sometimes they're not imported at all), but to the average user, they might as well be gone. Or, at best, it takes longer to get to them. There's no good reason for that. I want my bookmarks where I put them -- who is Mozilla to move them into a submenu? Same with the Links toolbar -- all the bookmarks the user is used to having one click away are now gone. This creates the perception that IE is easier to use, and encourages users to switch back to IE. Worse, when you modify the bookmarks in Mozilla, the changes don't show up in IE, the Start menu, or anywhere else that uses the Microsoft method of storing favourites. You end up with two unsynchronized sets of bookmarks.

    These sorts of things may not matter to any of you, reading this, but put Mozilla down in front of your mother, and she'll say, "I want it back the way I'm used to."

    It's the little, basic features, that matter most to the general population.
  • by davburns ( 49244 ) <davburns+slashdo ... m ['mai' in gap]> on Saturday November 29, 2003 @03:34PM (#7588537) Journal
    It's been a while since I followed bugtraq/NTbugtraq. Does Microsoft still charge people $90 (up front -- but supposedly refundable) if they want to report a security bug?

    If they are, then I can see why researchers aren't playing their silly game, especially if they discover several bugs. Further, Microsoft is giving up a small advantage they could have over open source. If they allowed non-public reporting of security bugs, then they could have that information before the crackers get it, while open source bugs are generally reported to open developer lists.

  • by ExtraT ( 704420 ) on Saturday November 29, 2003 @04:32PM (#7588825)
    I used to work in Microsoft technical support. From my experience, MS does everything to avoid receiving bug reports from end users, their system is designed in such a way that bug reports are automatically dropped, unless the originate from a pro support client (which pays millions of dollars for support). What this guy did is not only right, but also it is the only moral thing to do. Companies like MS should pay for their bad business practices.
  • by Anonymous Coward on Saturday November 29, 2003 @06:15PM (#7589354)
    The gzip bug demonstrated that it sometimes can even be worse on *nix, due to source code coping instead of shared libs, so that the bug had to be fixed in multiple places.

    I guess you missed the bit where zlib (not gzip) code was in all manner of Microsoft products, such as DirectX? Microsoft uses just as much Open Source code as any Linux project.
  • by iabervon ( 1971 ) on Saturday November 29, 2003 @08:20PM (#7589946) Homepage Journal
    In the case of zlib, the library is sufficiently small that some other packages distribute a version of it as part of their own sources, instead of expecting the system to contain it. Furthermore, some packages contain modified versions of zlib to account for different conditions (for example, the linux kernel contained a version of zlib restricted to do only some operations, to keep the kernel from getting too big).

    When the bug was found, some other packages had to patch the versions of zlib they contained, but the critical thing to note is that the ones that included zlib could just apply the patch to the older API version they contained, or to the trimmed version, or whatever they had. This meant that people could apply the patch without breaking half of their software, which depended on the particular API they were using.
  • by cooldev ( 204270 ) on Saturday November 29, 2003 @11:37PM (#7590676)

    That's ridiculous. No decent OS should allow itself to ever be crashed by any application software.

    Re-read the parent's post. He's not talking about Microsoft having to do workarounds for bad apps to prevent Windows from crashing. The workarounds are to prevent the bad 3rd party app from crashing.

    For example, many apps written for Win9x had tons of flaws with heap overflows, double-freeing pointers, dangling pointers, etc., but the developers "lucked out" and their apps didn't crash. However, when you tried to run the app on Win2k/XP it would fall over and die. In order to make XP compatible with older software they had to port the whole Win9x memory manager to XP and "shim" the memory functions in those apps so they'd work.

    There's a lot more to it than that, MS expends an astounding amount of effort to ensure that old software will run. Check out the application compatibility database sometime.

    (And even worse, Microsoft provides tools that you can run your app under to see if you have many of the types of flaws that create application compatibility problems (and random crashes), yet almost no developers use them.)

This file will self-destruct in five minutes.

Working...