MS Patch Day: 10 Flaws Fixed in Monster IE Update

Microsoft’s dominant Internet Explorer browser has undergone a major security makeover to plug 10 vulnerabilities that puts millions at risk of PC takeover, address bar spoofing and information disclosure attacks.

The monster IE update includes a fix for the “createTextRange()” code execution flaw that caused zero-day drive-by downloads and a significant modification to the way the browser renders certain ActiveX controls.

The ActiveX changes result from the ongoing patent dispute between Microsoft and Eolas Technologies and will now require IE users to manually interact with certain embedded multimedia content. A “compatibility patch” was also released to let IE users turn off the changes through June 2006.

In all, Microsoft shipped five bulletins with patches for 14 different vulnerabilities in a range of Windows products.

Three the five bulletins are rated “critical,” the company’s highest severity rating.

In addition to the IE update, critical bulletins were issued for a code execution bug in the MDAC (Microsoft Data Access Components Function) in Windows and a remotely exploitable flaw in Windows Explorer.

Microsoft recommends that Windows users treat the MS06-013 bulletin as a high-priority update to protect against an active attack vector that used social engineering tricks to lure IE users to Web sites rigged with bots, spyware, back doors and other Trojan downloaders.

Click here to read more about social engineering traps used to trick users.

The IE update applies to users of Windows 2000 (SP4 only), Windows XP (SP1 and SP2), and Windows Server 2003 (including SP1).

Ziff Davis Media eSeminars invite: Join our experts April 20 at 2 p.m. ET as they discuss high-availability and disaster recovery solutions that will keep your business on its feet, even in the face of large-scale disasters.

Read the full story on eWEEK.com: MS Patch Day: 10 Flaws Fixed in Monster IE Update

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles