EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.22.10

Microsoft Security Negligence Confirmed: Critical Internet Explorer Flaw Known and Ignored for 4 Months

Posted in Deception, Microsoft, Security, Windows at 4:12 pm by Dr. Roy Schestowitz

Summary: The newest facts show that Microsoft knowingly refused to fix flaws that led to tremendous damage; lies from Microsoft (about its competition) are refuted as well

IN MANY RECENT posts about Internet Explorer [1, 2, 3, 4, 5, 6, 7, 8], we have pointed out Microsoft’s pattern of negligence [1, 2, 3], which always passes costs (damages) to the public. Microsoft should probably be sued for it, rather than make money from it. Microsoft — like Goldman Sachs — is making a lot of money out of a crisis caused by its own risk-taking.

Here are some self-explanatory news headlines:

Microsoft lies to your face about browser security

Microsoft’s Head of Security and Privacy in the UK has told TechRadar that people who jump ship from Internet Explorer after the recent spate of bad headlines risk ending up on a less secure browser. With France and Germany both advising a move away from Internet Explorer, things are far from rosy for Microsoft’s browser [...yet] Microsoft’s UK security chief Cliff Evans insists that a non-Microsoft browser is the worse option. “The net effect of switching [from IE] is that you will end up on less secure browser,” insisted Evans. “The risk [over this specific] exploit is minimal compared to Firefox or other competing browsers… you will be opening yourself up to security issues.

Let’s fight FUD with facts…

Vulnerability Report: Mozilla Firefox 3.5.x
Unpatched: 0

Vulnerability Report: Google Chrome 3.x
Unpatched: 0

Vulnerability Report: Opera 10.x
Unpatched: 0

Vulnerability Report: Apple Safari 4.x
Unpatched: 0

Vulnerability Report: Microsoft Internet Explorer 6.x
Unpatched: 24
Most Critical Unpatched: Extremely critical

Vulnerability Report: Microsoft Internet Explorer 7.x
Unpatched: 11
Most Critical Unpatched: Extremely critical

Vulnerability Report: Microsoft Internet Explorer 8.x
Unpatched: 4
Most Critical Unpatched: Extremely critical

My recommendation if you use Windows: make sure the version of IE that’s installed (because you can’t uninstall it!) is the latest/least vulnerable (IE8) and then install at least one of the non-IE browsers listed (personally I always recommend Firefox :) and then use THAT. Of course, you could always switch to a Mac or Linux…

Microsoft patches IE, admits it knew of bug last August

As Microsoft patched the Internet Explorer (IE) vulnerability that was used to break into Google’s network, it also acknowledged that it had known of the bug since August 2009, when an Israeli security company reported the flaw.

MS knew of Aurora exploit four months before Google attacks

Microsoft first knew of the bug used in the infamous Operation Aurora IE exploits as long ago as August, four months before the vulnerability was used in exploits against Google and other hi-tech firms in December, it has emerged.

Redmond’s security gnomes finally got around to patching the exploit on Thursday. the hack attacks against Google et al targeted IE 6, a browser first released in 2001. Exploits involved tricking users of vulnerable browsers into visiting booby-trapped websites. These sites downloaded the Hydraq backdoor Trojan and other malicious components onto compromised PCs.

[...]

A quick search of Secunia’s database, via its PSI patching tool, reveals a problem with an unpatched ActiveX control that looks just as bad, for example.

Emergency IE patch goes live as exploits proliferate

Microsoft released an emergency security update for all versions of Internet Explorer on Thursday as attacks exploiting a critical vulnerability in the widely used browser spread to hundreds of websites.

[...]

While some of the sites hosting the attacks were free services that had been co-opted, others appeared to be domains of legitimate companies that had been compromised.

[...]

In an admission that’s sure to spark criticism, Microsoft said it learned of the critical bug more than three months ago.

[...]

The unscheduled bulletin fixes a memory corruption flaw in most versions of the widely used browser that allows attackers to execute malicious code simply by luring victims to a booby-trapped website. It fixes seven other privately reported vulnerabilities, some of which also made remote code execution possible, that Microsoft had been planning to issue next month during its next regularly scheduled patch release.

[...]

Systems compromised by the sites reported by Symantec were infected with a backdoor that collected registry settings and other system information and sent it to an email address that was under the control of attackers. That email address has since been disabled, Talbot said.

Widespread Attacks Exploit Newly Patched IE Bug

The first widespread attack to leverage a recently patched flaw in Microsoft’s Internet Explorer browser has surfaced.

Starting late Wednesday, researchers at antivirus vendor Symantec’s Security Response group began spotting dozens of Web sites that contain the Internet Explorer attack, which works reliably on the IE 6 browser, running on Windows XP. The attack installs a Trojan horse program that is able to bypass some security products and then give hackers access to the system, said Joshua Talbot, a security intelligence manager with Symantec.

Once it has infected a PC, the Trojan sends a notification e-mail to the attackers, using a U.S.-based, free e-mail service that Symantec declined to name.

Make the right browser update: Firefox 3.6

Neolithic Windows security hole alive and well in Windows 7

One of the reasons I’ve never liked Windows is that it was never made to deal with the security problems of working in a networked, multi-user world. As a direct result, Windows has been fundamentally insecure for more than a decade. Even so, I was surprised to find that there’s a 17-year old security hole that’s been in Windows since NT and it’s still present today in Windows 7.

Wow. Even I’m shocked by this latest example of just how rotten Windows security is. It just reminds me again though that while Microsoft keeps adding features and attempting to patch its way out of security problems to Windows, Windows’ foundation is built on sand and not on the stone of good, solid design.

[...]

Be that as it may, the code’s still in there. An attacker can trigger the vulnerability through a variety of means. The end-result is, surprise, another Windows machine that’s totally owned by the attacker. Once in charge, they can vacuum down your files, install malware, and all the other usual tricks.

Vista 7 was never secure to begin with. See the examples below.

  1. Cybercrime Rises and Vista 7 is Already Open to Hijackers
  2. Vista 7: Broken Apart Before Arrival
  3. Department of Homeland Security ‘Poisoned’ by Microsoft; Vista 7 is Open to Hijackers Again
  4. Vista 7 Security “Cannot be Fixed. It’s a Design Problem.”
  5. Why Vista 7 Could be the Least Secure Operating System Ever
  6. Journalists Suggest Banning Windows, Maybe Suing Microsoft Over DDoS Attacks
  7. Vista 7 Vulnerable to Latest “Critical” Flaws
  8. Vista 7 Seemingly Affected by Several More “Critical” Flaws This Month
  9. Reason #1 to Avoid Vista 7: Insecurity
  10. Vista 7 Left Hijackable Again (Almost a Monthly Recurrence)
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. uberVU - social comments said,

    January 22, 2010 at 9:26 pm

    Social comments and analytics for this post…

    This post was mentioned on Twitter by schestowitz: Critical Internet Explorer Flaw Known and Ignored for 4 Months http://boycottnovell.com/2010/01/22/refusing-to-fix-ie-flaws/

What Else is New


  1. IRC Proceedings: Tuesday, April 07, 2020

    IRC logs for Tuesday, April 07, 2020



  2. GitHug - A Guest Article by Thomas Grzybowski

    "Now, if Azure revenue has increased 72%, but the gross revenue in this category has only increased 25%, that means that the other components, primary GitHub, are actually a substantial negative."



  3. Links 7/4/2020: Firefox 75, Python 2.7.1 RC1

    Links for the day



  4. The Fall of the UPC - Part XIV: Media Owned and Controlled by Law Firms Did Not Properly Cover the Decision of the German Constitutional Court (FCC)

    We take another look at the shallow if not deliberately misleading coverage in sites that are literally owned and run by law firms, for the benefit of law firms rather than informing the public



  5. The Media Paints Bill Gates as the Man Who Will Save the World While Seattle's Police Department Obstructs Access to Documents About Pedophilia Arrest at His Home

    We're still unable to receive even one single page of the police report about arrest for pedophilia at the home of Bill and Melinda Gates; the media says nothing about this and instead it paints Gates as a national or international hero



  6. IRC Proceedings: Monday, April 06, 2020

    IRC logs for Monday, April 06, 2020



  7. Software Patents Remain Junk Patents in the United States (Not Enforceable), Whereas the EPO Keeps Granting Them and Promoting Them

    We take note of the positive outcomes in the US, where courts continue to reject software patents, but in Europe the largest patent office, which sought to replace all the courts, still acts as if patent law does not exist and patents can be endlessly printed irrespective of their merit (or validity as judged by actual courts)



  8. The Fall of the UPC - Part XIII: A Death Worth Celebrating and Many Lies Worth Debunking

    We take stock of positive responses to the decision made by the German constitutional court (FCC) 2.5 weeks ago; we also explain why it has taken so long to piece together firm-by-firm scoresheet for UPC lies



  9. GitHub is Moving the Free Software Movement Into “Check”

    GitHub's growing levels of control over Free software projects (GitHub itself is proprietary and Microsoft-controlled) ought to alarm the community; it's a lot worse than most people care to acknowledge, based on weeks of detailed analysis of GNU/Linux distros



  10. Links 6/4/2020: New Red Hat CEO, elementary OS Hera Updates

    Links for the day



  11. When the Decision is OK and the Judge's Motivations Are Also OK

    Justice Huber made the right call; but the bullies and charlatans who conspired to undermine laws and constitutions will never be satisfied



  12. The Fall of the UPC - Part XII: Doing the Unthinkable by Blaming the Judge's (Justice's) Wife?

    Team UPC and its media partners never cease to amaze us; anybody who stands in their way is either portrayed as a Russian stooge or too ignorant to be worth talking to



  13. The Fall of the UPC - Part XI: Lies Told by Bundesverband der Deutschen Industrie (BDI) in Süddeutsche Zeitung

    Today we look at misleading claims (or lies) published by Süddeutsche Zeitung after the Germans' constitutional court (FCC) had pointed out the obvious, namely that UPC ratification would be in violation of the German constitution



  14. IRC Proceedings: Sunday, April 05, 2020

    IRC logs for Sunday, April 05, 2020



  15. Links 5/4/2020: MindSpore, Covid-19 Projects and More

    Links for the day



  16. EPO is Just Like Some Cruel Political Party and Not a Patent Office

    The "cabal" which runs today's EPO (even the word "Mafia" seems suitable here) isn't acting -- not even remotely -- like a patent office; it's a patent-printing operation ("protection money" as income) that uses shallow political stunts to manufacture consent with the EU's 'generous' assistance



  17. Digitalisation and Digital Technologies as a Ploy to Justify Illegal Software Patents

    Say "hello" to the next weasel word/s; from the "hey hi" hype wave we've now moved to something "digital" (which can mean just about anything, including algorithms of all sorts)



  18. The Fall of the UPC - Part X: How We Shall Catalogue UPC Lies

    The cult that Team UPC became (one member lying to another member, maintaining a false version of reality) will be judged based on underlying facts, not lying about facts; we start with a token of contempt for IP Kat and Bristows LLP (there are overlaps)



  19. IRC Proceedings: Saturday, April 04, 2020

    IRC logs for Saturday, April 04, 2020



  20. Major Revelation: Microsoft Blackmail Against LAMP (GNU/Linux and Free Stacks for Servers) Goes At Least 16 Years Back, Predating the Novell Patent Deal

    (Techno-)Anthropological analyses of Microsoft's patent war on Free/libre software must take into account what Microsoft did to MySQL, a Swedish company at the time



  21. Links 4/4/2020: Sparky 5.11, Firefox 74.0.1, POCL 1.5

    Links for the day



  22. IRC Proceedings: Friday, April 03, 2020

    IRC logs for Friday, April 03, 2020



  23. Links 3/4/2020: Ubuntu Beta, GNOME 3.36.1, ExTiX LXQt Mini, NetBSD 8.2 Released

    Links for the day



  24. Digital Communication, Digitalisation and Videogaming Among the EPO's Latest Smokescreens for Illegal and Abstract Patents on Algorithms

    The EPO keeps liaising with the EU to promote patents which EU officials have themselves said were illegal; to make matters worse, the EPO's violations of its own laws inspire the United States to do the same



  25. Emotional Blackmail for Illegal Software Patents

    Semantic tactics the European Patent Office (EPO) uses to promote software patents in Europe and may theoretically use in the future (satire)



  26. Clear Linux is to GNU/Linux What Clearly Defined is to Open Source

    The idea that we need Intel to take GNU/Linux ‘mainstream’ is ludicrous; as OSDL co-founder (now succeeded in the flesh of the Corporate Linux Foundation), Intel is more about Linux (with DRM, “secure boot” and everything that lets it be remotely controlled) than about GNU and it’s not too keen on GPL (copyleft), either



  27. IRC Proceedings: Thursday, April 02, 2020

    IRC logs for Thursday, April 02, 2020



  28. Links 2/4/2020: Linux 5.6.2, Qt Creator 4.11.2, LineageOS ROM Based on Android 10

    Links for the day



  29. OIN in 2020 Resembles Linux Foundation in 2020 (Corporate Front Group Piggybacking the Linux Brand)

    We regret to say that the Open Invention Network seems not to care at all about Software Freedom; to make matters worse, it is a proponent of software patents and a voice for companies like IBM and Microsoft, not the "Community" it fancies misrepresenting



  30. Inside the Free Software Foundation (FSF) - Part IX: Semi-Happy Ending

    Richard Stallman is here to stay and the FSF will let him stay (as chief of GNU); we want to close the series on a positive note


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts