As Microsoft’s December patch rolls by , nicely bedecked with updates for security flaws that have plagued computers for the past few weeks, the astute observer might note the conspicious absence of a patch for a new flaw in the way Internet Explorer 7 parses XML that can lead to total compromise of affected systems.
Exploit code for this flaw exists in the wild in the form of malicious JavaScript on (mostly) chinese malware-spreading websites. The flaw was published by Chinese IT security outfit Knownsec.
http://www.scanw.com/blog/archives/303
Non-chinese-reading readers are advised to use the google-translated version we’ve provided a link to here.
The exploit is used to download and execute a known Trojan, so most AV users are relatively safe for the moment. However, the minute the payload is changed, the picture will become completely different. Remains to be seen if Microsoft will issue an out-of-cycle patch or wait for the usual month before acknowledging and fixing the issue.
tags
Razvan Stoica is a journalist turned teacher turned publicist and technology evangelist. Recruited by Bitdefender in 2004 to add zest to the company's online presence.
View all postsNovember 14, 2024
September 06, 2024