Microsoft has reported two vulnerabilities in the way Internet Explorer processes certain types of images. Attackers may be able to gain control of your machine if you view a malicious image, visit a web page, or open an email message that contains these images.
Microsoft has also published an update to address the cross-domain vulnerability discussed in SA04-163A. This vulnerability may allow an attacker to alter a web site to point to a different location. If the attacker can convince you to visit the site, they may be able to gain control of your machine.
Apply a patch
Microsoft has issued updates that resolve this problem. Obtain the appropriate update from Windows Update
Use caution with email attachments
Never open unexpected email attachments. Before opening an attachment, save it to a disk and scan it with anti-virus software. Make sure to turn off the option to automatically download attachments.
View email messages in plain text
Email programs like Outlook and Outlook Express interpret HTML code the same way that Internet Explorer does. Attackers may be able to take advantage of that by sending malicious HTML-formatted email messages.
Maintain updated anti-virus software
It is important that you use anti-virus software and keep it up to date. Most anti-virus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many anti-virus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.
In Microsoft Security Bulletin MS04-025, Microsoft describes a critical vulnerability in the way Internet Explorer processes .GIF and .BMP images. An attacker can use malicious images on a web page or in HTML-formatted email messages. If the attacker can convince a user to visit the web page, open the message, or otherwise view the image, the attacker may be able to gain control of the user’s machine.
There is also a vulnerability in the way Internet Explorer processes scripts. An attacker may be able to take advantage of frames to redirect users to a malicious web site.
More technical information about this issue is available in TA04-212A and Microsoft Security Bulletin MS04-025.
- Windows Security Updates for July 2004 – <http://www.microsoft.com/security/bulletins/200407_windows.mspx>
- Multiple Remote Code Execution Vulnerabilities in Microsoft Internet Explorer – <http://www.us-cert.gov/cas/techalerts/TA04-212A.html>
- Microsoft Security Bulletin MS04-025 – <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>
- US-CERT Computer Virus Resources – <http://www.us-cert.gov/other_sources/viruses.html>
- Understanding Anti-Virus Software – <http://www.us-cert.gov/cas/tips/ST04-005.html>
- Using Caution with Email Attachments – <http://www.us-cert.gov/cas/tips/ST04-010.html>
- Home Network Security – <http://www.cert.org/tech_tips/home_networks.html>
- Home Computer Security – <http://www.cert.org/homeusers/HomeComputerSecurity/
Author: Mindi McDowell. Feedback can be directed to the US-CERT Technical Staff.
Copyright 2004 Carnegie Mellon University. Terms of use
Last updated
Systems Affected Any system running Microsoft Windows (Windows 95 and newer) that are used…
Systems Affected Microsoft Windows systems running Internet Explorer 5.01 Internet Explorer 5.50 Internet Explorer…
Systems Affected Check Point Firewall-1 NG FCS Check Point Firewall-1 NG FP1 Check Point…
Systems Affected Systems running Microsoft Windows Overview Microsoft Windows contains multiple vulnerabilities,…
Systems Affected Systems running Microsoft Office XP and Outlook 2002 Overview There…
Systems Affected Applications and systems that use the OpenSSL SSL/TLS library Overview …
This website uses cookies.