Beware of Third-Party IE Patches?

thumbnail Beware of Third-Party IE Patches?

The absence of an official patch from Microsoft for a known and widely exploited Internet Explorer flaw has spawned a cottage industry for homegrown fixes. Security experts say a browser add-on masquerading as a third-party IE patch is being sold on the Internet, but users are being warned to steer clear of software from untrusted […]

Written By: Ryan Naraine
Nov 22, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The absence of an official patch from Microsoft for a known and widely exploited Internet Explorer flaw has spawned a cottage industry for homegrown fixes.

Security experts say a browser add-on masquerading as a third-party IE patch is being sold on the Internet, but users are being warned to steer clear of software from untrusted sources.

Word of the homegrown fixes come as malicious hackers have begun hijacking ad servers to use as a delivery mechanism for the Bofra/IFrame exploit.

Microsoft Corp. has not yet patched the IFrame buffer overflow vulnerability and, from all indications, a fix won’t be available until Dec. 14, when Redmond is next scheduled to roll out security updates.

The software giant said it had received reports of the homegrown IE patch making the rounds but warned that users should avoid installing or running software from an unknown source.

A Microsoft spokeswoman told eWEEK.com that while the add-on may have been developed with good intentions, the company cannot ensure the quality, reliability or safety of the fix.

“[We can’t] assure support for customers who experience problems when installing this add-on. As a security best practice, Microsoft would like to remind customers that they should only install or run software from a source that they trust,” the spokeswoman said.

Gartner security analyst John Pescatore echoed Microsoft’s warning. “Those third-party fixes are more likely to be malicious than helpful,” he said in an interview. “Even someone with good intentions can’t possibly create and test an IE fix properly. It may patch the immediate vulnerability but cause another set of problems with compatibility.”

Marcus Sachs, director of the SANS ISC (Internet Storm Center), said third-party patches had been used in the past by hackers to load spyware on unsuspecting victims.

“If you are going to update your browser, it should be a patch from Microsoft and not someplace else,” Sachs said. “If you use a homemade patch, you could be putting yourself at the mercy of an attacker.”

“I’m not saying the authors of that browser add-on are malicious hackers. But when people use third-party patches, they create opportunities for attackers to take advantage of consumer fear,” he added.

Columnist Jim Rapoza said Microsoft is making it easy to upgrade—to another browser. Click here to read more.

Microsoft said it was actively investigating the new Bofra/IFrame exploits, which are being described as a “criminal attack.”

“Microsoft’s early analysis indicates that the IFrame vulnerability only exists for Internet Explorer 6 and Internet Explorer 6 Service Pack 1,” the company said in a statement.

“It does not exist in Windows XP SP2 or Windows Server 2003; therefore customers who are running Windows XP SP2 or Windows Server 2003 should not be at risk from this attack.”

“[We are] taking this vulnerability very seriously; accordingly an update to correct the vulnerability is currently in development. We will release the security update when the development and testing process is complete, and the update is found to effectively correct the vulnerability.”

Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Recommended for you...

Leadership Roundup: July Adjustments to Executive Benches

July saw major leadership shakeups across the channel, with key C-suite hires at Pipefy, Coro, Snowflake, Chainguard, and more.

Jordan Smith
Aug 1, 2025
July Roundup: AI, Cyber Key to Several M&A Developments

July’s M&A wave spotlighted AI security, with major players like Palo Alto Networks, Darktrace, and TD SYNNEX leading transformative deals.

Jordan Smith
Aug 1, 2025
Lemongrass Debuts Tool to Streamline SAP Clean Core Work

Lemongrass debuts Clean Core AI Accelerator to help SAP users cut complexity, reduce technical debt, and prepare ERP systems for cloud and AI upgrades.

Franklin Okeke
Jul 31, 2025
Trend Micro and Google Cloud Double Down on AI Security

The expanded alliance emphasizes AI-driven defenses, sovereign cloud capabilities, and new anti-scam protections for businesses worldwide.

Allison Francis
Jul 30, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.