• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Watch out porn fans"

Collapse

  • Mordac
    replied
    Originally posted by _V_
    Luckily Microsoft are totally focussed on security. A patch is coming out in October, so all we have to do is stop using the Internet for a month.

    HTH
    Technically, all we have to do is stop surfing for porn for a month, which is almost as bad...

    Leave a comment:


  • AlfredJPruffock
    replied
    IE ?

    Not me I prefer a Night at the Opera

    www.opera.com

    Leave a comment:


  • _V_
    replied
    Luckily Microsoft are totally focussed on security. A patch is coming out in October, so all we have to do is stop using the Internet for a month.

    HTH

    Leave a comment:


  • DaveB
    replied
    Guess what? It's another buffer overflow exploit. No surpise there and anyone with anything to do with security and secure development will recognise this one.

    From CERT.

    Microsoft IE version 5.0 and higher support the Vector Markup Language (VML), which is a set of XML tags for drawing vector graphics. IE fails to properly handle malformed VML tags allowing a stack buffer overflow to occur. If a remote attacker can persuade a user to access a specially crafted web page with IE, that attacker may be able to trigger the buffer overflow. In addition, an attacker could deliver an HTML email message or entice a user to select an HTML document in Windows Explorer.

    On Windows XP SP2 systems the vulnerable component (VGX.DLL) is compiled with the /GS (Buffer Security Check) flag. However, exploits using techniques to circumvent the Buffer Security Check are publicly available.
    All it takes is a correctly built web page with a deliberately malformed VML tag or the same tag in an HTML e-mail and your PC is toast. There is currently no fix. The only solution is to use another browser and hope they dont have the same problem.

    Edit :

    Did a bit more digging and there is a work around for it.

    Microsoft Security Advisory (925568) suggests the following techniques to disable VML support:

    Un-register Vgx.dll on Windows XP Service Pack 1; Windows XP Service Pack 2; Windows Server 2003 and Windows Server 2003 Service Pack 1

    Modify the Access Control List on Vgx.dll to be more restrictive

    Configure Internet Explorer 6 for Microsoft Windows XP Service Pack 2 to disable Binary and Script Behaviors in the Internet and Local Intranet security zone.
    So basically cripple your existing browser or use a different one.
    Last edited by DaveB; 25 September 2006, 12:28.

    Leave a comment:


  • Troll
    replied
    As long as Firefox is unaffected....

    Leave a comment:


  • xoggoth
    replied
    Porn using vector graphics? Must be rather naff porn!

    Leave a comment:


  • wc2
    replied
    What!

    I Flaw in IE?

    Whatever are we going to do?

    Leave a comment:


  • DimPrawn
    started a topic Watch out porn fans

    Watch out porn fans

    http://news.bbc.co.uk/1/hi/technology/5365296.stm

    Microsoft has issued warnings about a serious flaw in Internet Explorer that allows attackers to hijack a PC via the popular browser.

    Security firm Sunbelt Software said the vulnerability was being actively exploited on some porn websites.

    So far there is no fix to close the bug in the browsing program but Microsoft has issued advice about how to avoid falling victim.

    It said it would patch the bug in its next security update due on 10 October.

    Researcher Adam Thomas uncovered the exploit which revolves around the way that the Internet Explorer browser handles a particular form of graphics known as vector graphics.

    A properly crafted webpage can exploit this problem and install almost anything they want on the target machine.

    Unusable PC

    Tests by Sunbelt Software on a Windows machine patched with all the latest security updates showed attackers installing a huge amount of spyware and other malicious programs.

    Watch out RR and others.
Working...
X