****REPOSTED IN DIFFERENT COLOR SO IT'S EASIER TO READ****
A Chinese security researcher has warned of five serious vulnerabilities in Microsoft's (Quote, Chart) Internet Explorer browser, warning that a successful exploit could lead to system takeover.
Liu Die Yu released details of the flaws on the Bugtraq mailing list and issued a warning that the vulnerabilities could lead to system access, exposure of sensitive information, cross site scripting and security bypass.
Yu also released proof-of-concept exploits on the popular mailing list, noting that the flaws affect Internet Explorer versions 5.0, 5.5 and 6.0.
Independent security consultant Secunia has rated the flaws 'Extremely Critical' and urged IE users to disable Active Scripting as a workaround until Microsoft issues a fix.
The flaws related to a redirection feature in the browser using the "mhtml:" URI handler. The researcher warned that it could be exploited to bypass a security check in Internet Explorer which normally blocks web pages in the "Internet" zone from parsing local files.
Yu said the redirection feature could also be exploited to download and execute a malicious file on a user's system. Successful exploitation requires that script code can be executed in the "MyComputer" zone, he explained.
The security alert also included a cross-site scripting vulnerability that could allow a malicious attacker to execute script code in the security zone associated with another Web page if it contains a subframe.
A variant of a previously fixed flaw can still be exploited to hijack a user's clicks and perform certain actions without the user's knowledge, the researcher explained.
Microsoft, which usually issues cumulative patches to fix Internet Explorer vulnerabilities, has adopted a new schedule to release fixes on the second Tuesday of every month. However, the company has said it would break that schedule if active exploits are circulating and causing major damage.
The company could not be reached to comment on Yu's public release of the proof-of-concept exploits.
Separately, the software giant released a knowledge base advisory to fix a flaw in the Microsoft Exchange Server 2003. The company said the issue related to the way Windows SharePoint Services use Kerberos authentication.
"To configure a virtual server that is extended with Windows SharePoint Services to use Kerberos authentication, you must first enable Kerberos in IIS, and then configure an SPN for the domain account that the virtual server is running as," the company explained.
http://siliconvalley.internet.com/news/article.php/3114171Best,
Jerry
****END REPOST***