TUCoPS :: Browsers :: hack1413.htm

Microsoft Internet Explorer Install Engine Control Buffer Overflow
Microsoft Internet Explorer Install Engine Control Buffer Overflow

Peter Winter-Smith of NGSSoftware has discovered a high risk
vulnerability in the Microsoft Internet Explorer Install Engine control.

Versions of Internet Explorer which are affected include:

Microsoft Internet Explorer 5.x
Microsoft Internet Explorer 6.x

This vulnerability has now been fixed by Microsoft, and a fix can be
downloaded from the Microsoft Security website:

http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx 

NGSSoftware are going to withhold details about this flaw for three
months. Full details will be published on the 19th of January 2005. This
three month window will allow users of Microsoft Internet Explorer the
time needed to apply the patch before the details are released to the
general public. This reflects NGSSoftware's new approach to responsible
disclosure.

This vulnerability, including many others identified and fixed by
Microsoft in this month's Cumulative Security Update, can be detected by
Typhon III - NGSSoftware's advanced vulnerability scanner.  Typhon III
will rapidly detect hosts on your network susceptible to these
vulnerabilities and enable your organisation to manage risk.

For existing Typhon III customers, please use the Typhon III update option
to include these new vulnerability checks.

For more information about Typhon III please visit NGSSoftware's website
at http://ngssoftware.com/ -  a free trial version is available for 
download.

NGSSoftware Insight Security Research
http://www.databasesecurity.com/ 
http://www.nextgenss.com/ 
+44(0)208 401 0070

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH