Researchers warn of IE6 zero-day bug

Gregg Keizer
04 Jul 2008
00:00

Security researchers are warning users about an unpatched cross-site scripting bug in Internet Explorer 6 (IE6) that could be used by hackers to capture keystrokes and steal other information.

The vulnerability appears to be a variation of a vulnerability first discussed by researchers Manuel Caballero and Fukami at Microsoft Corp.'s on-site BlueHat security conference early last month, Yichong Lin, an analyst at McAfee Inc., said in an entry to the company's blog.

At BlueHat, Caballero, who has worked for Microsoft as an independent penetration tester, said he had found a way to capture every browser action, including keystrokes used to type passwords. In a videotaped interview that Microsoft conducted during BlueHat, Caballero said that the combination of Flash and any browser, not just IE, could be hacked with a malicious script to give attackers full access to the browser.

Details of the recent variant, as well as proof-of-concept code, were posted to a Chinese-language security e-zine by a group calling itself 'Ph4nt0m Security Team,' according to another alert issued by the Danish vulnerability tracking firm Secunia.

Secunia outlined the threat: 'The vulnerability is caused due to an input validation error when handling the 'location' or 'location.href' property of a window object. This can be exploited by a malicious website to open a trusted site and execute arbitrary script code in a user's browser session in context of the trusted site.'

IE7, the current version of Microsoft's browser, does not contain the vulnerability, both Secunia and McAfee said. Until Microsoft produces a patch for the older browser, users should update to IE7, they added.

Yichong of McAfee said that the security company had notified Microsoft about the vulnerability. Microsoft representatives, however, did not immediately reply to a request for confirmation and additional comment.

Related content

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.