<<< Date Index >>>     <<< Thread Index >>>

Microsoft Internet Explorer Install Engine Control Buffer Overflow



Peter Winter-Smith of NGSSoftware has discovered a high risk
vulnerability in the Microsoft Internet Explorer Install Engine control.

Versions of Internet Explorer which are affected include:

Microsoft Internet Explorer 5.x
Microsoft Internet Explorer 6.x

This vulnerability has now been fixed by Microsoft, and a fix can be
downloaded from the Microsoft Security website:

http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx

NGSSoftware are going to withhold details about this flaw for three
months. Full details will be published on the 19th of January 2005. This
three month window will allow users of Microsoft Internet Explorer the
time needed to apply the patch before the details are released to the
general public. This reflects NGSSoftware's new approach to responsible
disclosure.

This vulnerability, including many others identified and fixed by
Microsoft in this month's Cumulative Security Update, can be detected by
Typhon III - NGSSoftware's advanced vulnerability scanner.  Typhon III
will rapidly detect hosts on your network susceptible to these
vulnerabilities and enable your organisation to manage risk.

For existing Typhon III customers, please use the Typhon III update option
to include these new vulnerability checks.

For more information about Typhon III please visit NGSSoftware's website
at http://ngssoftware.com/ -  a free trial version is available for
download.

NGSSoftware Insight Security Research
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070