Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Cumulative Patch for Internet Explorer flawed

Cumulative Patch for Internet Explorer flawed

by Nikola Strahija on May 19th, 2002 Microsoft Security Bulletin MS02-023 - Cumulative Patch for Internet Explorer released on 15 May 2002 was flawed. Yesterday, the bulletin was updated to correct erroneous information regarding attack vectors for the Cross-Site Scripting in Local HTML Resource and Script within Cookies Reading Cookies vulnerabilities and the capabilities of locally run scripts.


Microsoft Security Bulletin MS02-023 can be found here:
http://www.net-security.org/advisory.php?id=693

Updated Microsoft Security Bulletin is linked below the GreyMagic Software patch rant.

GreyMagic Software posted the following to BugTraq:

Microsoft released a cumulative patch yesterday, which, among other issues, allegedly patches the dialogArguments vulnerability (http://jscript.dk/adv/TL002/).

In their bulletin Microsoft makes several severe errors:

1. "A cross-site scripting vulnerability in a Local HTML Resource..."

No, Microsoft, the problem is not plain cross site scripting, the problem is that dialogArguments' security restrictions are bypassed and it is passed to the dialog even though it shouldn't. Please re-read the advisories.

2. "A successful attack requires that a user first click on a hyperlink. There is no way to automate an attack using this vulnerability."

This is simply wrong, the user doesn't have to click anything for this issue to be exploited, it can run automatically.

3. Microsoft also claims that this issue only exists in IE6.

Microsoft obviously doesn't follow Bugtraq. This issue also exists in IE5 and IE5.5, as we demonstrated in our GM#001-AX advisory.

In conclusion, Microsoft did not understand the problem. They only patched a symptom of this vulnerability, not its root cause.

As a result of that incomplete "patch" IE5 and IE5.5 are still very much vulnerable to this attack in other resources. For a demonstration see http://sec.greymagic.com/adv/gm001-ax/.

We hope that Microsoft fixes the actual issue this time, and not just the resource file.

Read more at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-023.asp


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »