Archived Blog
Internet Explorer
This bulletin includes a cumulative security update for IE (MS05-058), labeled with a severity rating of "critical".NOTE: Please keep in mind that these vulnerabilities are not technically limited to only IE. Since MS Outlook automatically displays emails in HTML, Outlook users may also be susceptible!
The first four vulnerabilities are cross-domain vulnerabilities. What this means is that if you have the habit of surfing the Web with multiple windows/tabs open like I do, the information from one Web site could be stolen by another. For instance, if you logged on to your bank Web site to check on your balance in one browser window, one of your other browser windows could be silently be stealing your banking information. And seriously, who doesn't have more than one browser tab/window opened while surfing the Web these days?
The four vulnerabilities are:
- Window Location Property Cross-Domain Vulnerability (CVE-2008-2947)
- HTML Element Cross-Domain Vulnerability (CVE-2008-3472)
- Event Handling Cross-Domain Vulnerability (CVE-2008-3473)
- Cross-Domain Information Disclosure Vulnerability (CVE-2008-3474)
To top it off, we have two more memory corruption vulnerabilities. What this means is that if your browser was accidentally fed a specially crafted code from malicious Web site, the attacker would be able to execute any code he/she desires (usually a Trojan), and have complete control of your desktop. The two vulnerabilities are:
- Uninitialized Memory Corruption Vulnerability (CVE-2008-3475)
- HTML Objects Memory Corruption Vulnerability (CVE-2008-3476)
MS Office Excel
Excel as a Web threat? I'm including Excel as an item on this post because it's very common for people to pass around Excel spreadsheets by means of attaching it to an email, a shared network drive, or one of the many Web 2.0 file sharing services. Occasionally, you'll also see one of those forward/chain emails of Excel funnies that spread virally, so just take this as a word of caution.So what do these vulnerabilities allow an attacker to do? Well, by specially crafting a malicious .xls file, the attacker could present you with what you were expecting (the actual data, the internet joke, etc.), while silently taking complete control of your desktop by means of installing a Trojan. That is, open an .xls attachment = oops, my desktop is infected.
The Excel vulnerabilities patched this month:
- Calendar Object Validation Vulnerability (CVE-2008-3477)
- File Format Parsing Vulnerability (CVE-2008-3471)
- Formula Parsing Vulnerability (CVE-2008-4019)
All of the Excel vulnerabilities mentioned above also come with the complimentary severity rating of "critical". We'll be on the lookout for these being exploited in the wild, and keep y'all posted - right here on our blog. Grab our RSS feed or subscribe via email to keep abreast of emerging Web threats.
Security Researcher: Jay Liew