Barney's Blog

Blog archive

IE Hole Explored

Hopefully you learn something new everyday. Today I learned what MHTML is: It is a protocol handler that stands for MIME Encapsulation of Aggregate HTML (who thinks of this stuff?).

So why does MHTML matter? Because hackers can use it to crack IE in a similar fashion as a server-side cross-site-scripting vulnerability.

The attack vector points to a seemingly innocent (but ultimately malicious) link. Click on the puppy and your Windows machine could be running bad code in no time.

Experts are generally unconcerned, thinking this kind of attack is too complicated for the garden variety (read dense) hacker. Nonetheless, Microsoft is checking it out and already has a workaround -- simply block MHTML scripting. Hey, I could have thought of that!

Posted by Doug Barney on 01/31/2011 at 1:18 PM


Featured

  • Is Microsoft Finally Reinventing Office?

    Microsoft is testing out a new technology called "Fluid Framework." It could mean that Brien's dream of one Office app to rule them all might soon become reality.

  • Azure Active Directory Connect Preview Adds Support for Disconnected AD Forests

    Microsoft on Thursday announced a preview of a new "Cloud Provisioning" feature for the Azure Active Directory Connect service that promises to bring together scattered Active Directory "forests."

  • Microsoft Defender ATP Gets macOS Investigation Support

    The endpoint and detection response (EDR) feature in Microsoft Defender Advanced Threat Protection (ATP) has reached the "general availability" stage for macOS devices.

  • How To Block Self-Service Purchasing in Microsoft's Power Platform

    Microsoft threw Office 365 admins a bone when it gave them the ability to block users from purchasing Power Platform tools without IT approval. Here's how to prevent total anarchy.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.