MS Patch Train Drops Off 'Critical' IE FixBy Ryan Naraine | Print
Desktop-as-a-Service Designed for Any Cloud ? Nutanix Frame
Redmond ships 10 bulletins to cover a dozen security vulnerabilities, including a pair of code-execution holes in the Internet Explorer browser.Microsoft on Tuesday released 10 advisories to cover a slew of security flaws in a range of products, including a "critical" cumulative update for the Internet Explorer browser.
Three of the 10 bulletins are rated "critical," the company's highest severity rating.
The IE fix, covered in MS MS05-025, corrects a remote code-execution vulnerability that exists due to the way the browser handles PNG (Portable Network Graphics) files.
The latest IE update also fixes a data leakage that occurs in the way IE handles certain requests to display XML content. "An attacker could exploit the vulnerability by constructing a malicious Web page that could potentially lead to information disclosure if a user visited a malicious Web site or viewed a malicious e-mail message," Microsoft said.
A successful attacker could exploit the flaw to read XML data from another Internet Explorer domain. Microsoft said user interaction is required to exploit this vulnerability.
The IE flaws were confirmed on Windows 2000 SP3 and SP4, Windows XP (SP1 and SP2 inclusive), and Windows Server 2003 (including SP1). Patches were also rolled out for users of Windows 98 and Windows ME (Millennium Edition).
The June patch batch also contained "critical" fixes for a vulnerability in HTML Help that puts users at risk of remote code execution attacks. In its MS05-026 bulletin, Microsoft warned that "an attacker who successfully exploited this vulnerability could take complete control of the affected system."
Microsoft HTML Help is the standard help system for the Windows platform. Web developers typically use HTML Help to create online help files for software applications or to create content for multimedia titles or Web sites.
The HTML Help bulletin applies to Windows 98, Windows ME, Windows 2000 (including SP3 and SP4), Windows XP (SP1 and SP2 inclusive) and Windows Server 2003, including SP1.
The company also rated the MS05-027 bulletin, which was detected in the SMB protocol, as "critical" and warned that a successful exploit could allow an attacker to hijack a PC without the user's knowledge.
"An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft said.
and other coverage of Microsoft patches on eWEEK.com.