News

Vulnerability in Microsoft Internet Explorer Discovered

A vulnerability in Microsoft Internet Explorer has been discovered that could allow a malicious Web site operator, under certain circumstances, to read files on the computer of a user who visited the site.

Client-local data that is displayed in the browser can be made available to the server by using a redirect to a Javascript applet running in the same window. This bypasses cross-domain security and makes the data available to the applet, which could then send the data to a hostile server. This could allow a malicious Web site operator to read the contents of files on visiting users' computers. The vulnerability would not allow the malicious user to list the contents of the folders, create, modify or delete files, or to usurp any administrative control over the machine.

A patch is being developed by Microsoft to fix the vulnerability. Meanwhile, Microsoft recommends that Internet Explorer users add sites that they trust to the Trusted Zone in Internet Explorer, and disable Active Scripting in the Internet Zone, in order to work around the vulnerability. For more information on the vulnerability, check Microsoft's Security Bulletin FAQ.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft 365 Users Getting My Feed and SharePoint Page Diagnostics

    Microsoft on Monday announced new Microsoft 365 and SharePoint Online improvements that are getting rolled out to subscribers.

  • Using Metadata To Make Non-Text Data Easier To Find

    Content indexing works well for finding files that contain text, but it's no help when searching for non-text data. Brien's workaround is to take advantage of Windows 10's file metadata feature.

  • Microsoft Previews Windows Autopilot for HoloLens 2

    Microsoft on Friday announced a public preview of Windows Autopilot for HoloLens 2, its mixed-reality headset.

  • Microsoft Flirts with Charging for API Software Connections

    Microsoft may have started something new by attempting to charge its customers for software that uses its application programming interfaces (APIs).

comments powered by Disqus