Exploit Code Published for Unpatched IE Vulnerability

Discussion in 'News' started by tripwire45, Oct 1, 2006.

  1. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287

    Exploit Code Published for Unpatched IE Vulnerability



    Malware researcher H.D. Moore, co-founder of the Metasploit Framework, has published software exploit code meant to prove that a vulnerability in Microsoft's Internet Explorer browser that he first publicized in July remains unpatched and capable of being attacked. According to Moore, and other security researchers including Copenhagen, Denmark-based Secunia, the IE-borne vulnerability has been confirmed as legitimate on Windows computers running Internet Explorer 6.0 and Microsoft's Windows XP Service Pack 2.

    Read the entire story at eWeek.com
     
    Certifications: A+ and Network+
porta2_tags:

Comments

    1. zebulebu
      zebulebu
      There have been rumours of this vulnerability for a couple of weeks now floating around on some of the more credible security newsgroups & forums (fora?)

      Nice to know there are still loads of unpatched code vulnerabilities in XPSP2/IE6SP1 - meaning lots of juicy zero-day exploits around for years to come no doubt.

      Must give every poor sod still using 9X & NT a warm, fuzzy feeling to know that MS isn't even bothering to look at vulnerabilities for their platforms any more...
    2. GmanUK
      GmanUK
      Makes you look forward that much more to Vista...or should it be called holey Vista?!!

      I'm more interested in reports about patches nowadays than addons....that tells you something! :dry
    3. Theprof
      Theprof
      I dont think vista is gonna be that secure when it comes out, its gonna take some time for the vulnerabilities to be found and patched before its "secure".

    Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.