Warning: include(/home1/george/public_html/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home1/george/public_html/wp-settings.php on line 84

Warning: include(): Failed opening '/home1/george/public_html/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/cpanel/ea-php74/root/usr/share/pear') in /home1/george/public_html/wp-settings.php on line 84

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 706

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 706

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 707

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 707

Deprecated: Function get_magic_quotes_gpc() is deprecated in /home1/george/public_html/wp-includes/load.php on line 760
interner explorer – Tales from the bits http://talesfromthebits.com This is a blog about technology, computer science, software engineering and personal notes from these fields Fri, 17 Jun 2016 16:53:16 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.16 Microsoft released the fix for the vulnerability in IE http://talesfromthebits.com/2010/01/microsoft-released-the-fix-for-the-vulnerability-in-ie.html http://talesfromthebits.com/2010/01/microsoft-released-the-fix-for-the-vulnerability-in-ie.html#respond Fri, 22 Jan 2010 10:28:05 +0000 http://talesfromthebits.com/?p=172 According to Microsoft the vulnerability was in the mshtml.dll.  Those who install the update are NOT vulnerable and are protected from all known attack vectors.  There is a full description on Microsoft Security Bulletin MS10-002 – Critical.

]]>
http://talesfromthebits.com/2010/01/microsoft-released-the-fix-for-the-vulnerability-in-ie.html/feed 0
Vulnerability in Internet Explorer http://talesfromthebits.com/2010/01/vulnerability-in-internet-explorer.html http://talesfromthebits.com/2010/01/vulnerability-in-internet-explorer.html#comments Mon, 18 Jan 2010 09:32:20 +0000 http://talesfromthebits.com/?p=165 The recent attack to Google, Adobe and other companies revealed a vulnerability that exists in many versions of Internet Explorer. According to Wired the attack was ultra sophisticated and targeted source code from Google, Adobe and dozens of other high-profile companies. The level of sophistication was equal to the attacks seen in defense industry. Microsoft has released a Security Advisory (979352). The products that are vulnerable are Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. The Advisory explains the vulnerability:
“The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.”
George Stathakopoulos, of the Microsoft Security Response Center stated that “Based on a rigorous analysis of multiple sources, we are not aware of any successful attacks against IE7 and IE8 at this time……we have teams working around the clock worldwide to develop a security update of appropriate quality for broad distribution to address this vulnerability.”

This security vulnerability is serious for big corporations and governments that use Internet Explorer. The German Federal Office for Security in Information Technology (known as BSI) recommends that all Internet Explorer users switch to an alternative browser.

Personally I doubt that home users will be affected from that vulnerability. Mainly the threat for the time being is for corporate and government users. In any case you should immediately upgrade to Internet Explorer 8. You may also choose to use another web browser until Microsoft releases a fix for this vulnerability.

]]>
http://talesfromthebits.com/2010/01/vulnerability-in-internet-explorer.html/feed 2