Security Patches
Summary
On September 28, 1999, Microsoft released a workaround
for a security vulnerability in Microsoft® Internet Explorer 5 that could
allow a malicious web site operator to read files on the computer of a
person who visited the site. Microsoft has completed a patch that
completely eliminates the vulnerability.
Frequently asked questions regarding this vulnerability can be found on
the Microsoft security
Web site.
Issue
IE 5 includes a feature called "download behavior" that
allows web page authors to download files for use in client-side script.
By design, a web site should only be able to download files that reside in
its domain; this prevents client-side code from exposing files on the
user's machine or local intranet to the web site. However, a server-side
redirect can be used to bypass this restriction, thereby enabling a
malicious web site operator to read files on the user's machine or the
user's local intranet. This vulnerability would chiefly affect
workstations that are connected to the Internet.
Affected Software Versions:
Patch Availability
The patch is available for download at either of the following
locations:
More Information
Please see the following references for more information related to
this issue.
Obtaining Support on this Issue
If you require technical assistance with this issue, please contact Microsoft
Technical Support.
Summary
On September 10, 1999, Microsoft provided a workaround for a security
vulnerability in Microsoft© Internet Explorer 5 that could allow a
malicious web site operator to take inappropriate action on the computer
of a person who visited the site. Microsoft has completed a patch that
completely eliminates the vulnerability. In addition to eliminating the
"ImportExportFavorites" vulnerability, the patch also eliminates
a security vulnerability posed by several ActiveX controls that ship as
part of Internet Explorer 4.01 and 5.
Frequently asked questions regarding this vulnerability can be found on
the Microsoft security
Web site.
Issue
IE 5 includes a feature that allows users to export a list of their
favorite web sites to a file, or to import a file containing a list of
favorite sites. The method that is used to perform this function, ImportExportFavorites(),
should only allow particular types of files to be written, and only to
specific locations on the drive. However, it is possible for a web site to
invoke this method, bypass this restriction and write files that could be
used to execute system commands. The net result is that a malicious web
site operator potentially could take any action on the computer that the
user would be capable of taking.
This vulnerability would chiefly affect workstations that are connected
to the Internet. The patch restores correct operation to the
ImportExportFavorites() method. In addition, the patch addresses security
problems posed by several ActiveX controls. The specific controls and the
actions taken are discussed in the FAQ.
Affected Software Versions:
Patch Availability
More Information
Please see the following references for more information related to
this issue.
Obtaining Support on this Issue
If you require technical assistance with this issue, please contact Microsoft
Technical Support.
Microsoft has released a patch that eliminates security vulnerabilities
in two ActiveX controls. The net effect of the vulnerabilities is that a
web page could take unauthorized action against a person who visited it.
Specifically, the web page would be able to do anything on the computer
that the user could do.
Affected Software Versions:
More information is available in the Microsoft Knowledge Base
Article's:
Here is the Scriptlet.typlib/Eyedog
Patch.
Note: Circa September 7, 1999, the
patch also will be available through WindowsUpdate.
Patch for "Malformed Favorites Icon" Vulnerability (28 May 1999)Microsoft has released a single patch that eliminates two security vulnerabilities in Microsoft® Internet Explorer 4.0 and 5. The first potentially could allow arbitrary code to be run on a user's computer. The second potentially could allow the local hard drive to be read. A fully supported patch is available to eliminate both vulnerabilities, and Microsoft recommends that affected customers download and install it, if appropriate. Affected Software Versions:
More information is available in the Microsoft Knowledge Base Article's:
The patch can be found at www.microsoft.com/windows/ie/security/favorites.asp. Note I: The patch will determine the version of IE and the platform on which it is installed, and will apply only the appropriate fix. As a result, the single patch above is appropriate for use by customers who are affected by either or both of the vulnerabilities. Note II: Windows 98 Second Edition contains all patches listed below, however this patch still needs to be installed on Windows 98 Second Edition. The patch installes an updated shdocvw.dll file. the Win98SE version of this file is 5.00.2614.3500, the updated version is 5.00.2717.2000.
When you attempt to install the
update for the "Malformed Favorites Icon" security issue, you
may receive one of the following error messages:
This update does not need to be
installed on this system. Download and Installation Failed For more information and a resolution, see Microsoft Knowledge Base
Article No. Q243042.
Patch for "DHTML Edit" Vulnerability (21 April 1999)Microsoft has released a patch that eliminates a vulnerability in an ActiveX control that is distributed in Internet Explorer 5 and downloadable for Internet Explorer 4.0. The vulnerability could allow a malicious web site operator to read information that a user had loaded into the control, and it also could allow files with known names to be copied from the user's local hard drive. Affected Software Versions:
More information is available in the Microsoft Knowledge Base Article No. Q226326 Update Available For "DHTML Edit" Security Issue. The patch can be found at http://www.microsoft.com/windows/ie/security/dhtml_edit.asp.
MSHTML Update Available for Internet Explorer (21 April 1999)Microsoft has released an updated version of a component of Internet Explorer 4.0 and 5. The updated version eliminates three security vulnerabilities described below. MSHTML.DLL is the parsing engine for HTML in Internet Explorer. The vulnerabilities that are eliminated by the update are not related to each other except for the fact that all reside within the parsing engine.
Affected Software Versions:
More information is available in the Microsoft Knowledge Base Article No. Q226325 Update Available For MSHTML Security Issues In Internet Explorer. The patch can be found at http://www.microsoft.com/windows/ie/security/mshtml.asp. |
||
Источник: http://www.windows-help.net/ |