Two More IE Holes Surface

thumbnail Two More IE Holes Surface

Security researchers are warning of another pair of vulnerabilities in Microsoft Corp.’s Internet Explorer browser affecting users on fully patched Windows XP Service Pack 2 systems. According to an alert from Secunia that carries a “moderately critical” rating, the holes can be exploited to bypass a security feature in XP SP2 and trick users into […]

Written By: Ryan Naraine
Nov 17, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security researchers are warning of another pair of vulnerabilities in Microsoft Corp.’s Internet Explorer browser affecting users on fully patched Windows XP Service Pack 2 systems.

According to an alert from Secunia that carries a “moderately critical” rating, the holes can be exploited to bypass a security feature in XP SP2 and trick users into downloading malicious files.

Read here why Peter Coffee says IE flaws should come as no surprise.

The company said a bug was flagged in the SP2 security feature that warns users when opening downloaded files of certain types. “The problem is that if the downloaded file was sent with a specially crafted ‘Content-Location’ HTTP header in some situations, then no security warning will be given to the user when the file is opened,” Secunia said.

It’s not known if that flaw is related to a similar warning issued by Finjan Software earlier this week.

Finjan claims it discovered a bug in the SP2 notification mechanism and has already proven to Microsoft that hackers can bypass the mechanism to inject arbitrary code without any warning or notification.

Microsoft has disputed the severity of Finjan’s claims, insisting they are “potentially misleading and possibly erroneous.” The software giant said it will continue investigating Finjan’s claims to confirm valid vulnerability claims before rolling out possible fixes.

Secunia is also warning of another IE bug that causes an error when using a Javascript function. That vulnerability can be exploited to spoof the file extension in the “Save HTML Document” dialog.

The research outfit also said a combination of the two flaws could be exploited by an attacker to trick a user into downloading a malicious executable file pretending to be an HTML document.

“The vulnerabilities have been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2,” the company said, recommending that IE users disable Active Scripting support and the “Hide extension for known file types” option.

A Microsoft spokeswoman said the company was aware of the Secunia listing. “We have not been made aware of any active attacks against the reported vulnerabilities or customer impact at this time, but we are aggressively investigating the public reports,” she said.

Microsoft also criticised the public disclosure of the flaw information before a patch could be created, tested and deployed.

For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Separately, Microsoft re-released its MS04-039 security bulletin to correct some issues affecting customers using ISA Server 2000 Service Pack 1 or Windows 2000 Service Pack 3.

That patch was issued earlier this month to fix a content spoofing vulnerability in ISA Server 2000 and Proxy Server 2.0.

Editor’s Note: This story was updated to include information and comments from Microsoft.

Check out eWEEK.com’s for the latest security news, reviews and analysis.

Recommended for you...

Leadership Roundup: July Adjustments to Executive Benches

July saw major leadership shakeups across the channel, with key C-suite hires at Pipefy, Coro, Snowflake, Chainguard, and more.

Jordan Smith
Aug 1, 2025
July Roundup: AI, Cyber Key to Several M&A Developments

July’s M&A wave spotlighted AI security, with major players like Palo Alto Networks, Darktrace, and TD SYNNEX leading transformative deals.

Jordan Smith
Aug 1, 2025
Lemongrass Debuts Tool to Streamline SAP Clean Core Work

Lemongrass debuts Clean Core AI Accelerator to help SAP users cut complexity, reduce technical debt, and prepare ERP systems for cloud and AI upgrades.

Franklin Okeke
Jul 31, 2025
Trend Micro and Google Cloud Double Down on AI Security

The expanded alliance emphasizes AI-driven defenses, sovereign cloud capabilities, and new anti-scam protections for businesses worldwide.

Allison Francis
Jul 30, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.