Microsoft has reported two vulnerabilities in the way Internet Explorer processes certain types of images. Attackers may be able to gain control of your machine if you view a malicious image, visit a web page, or open an email message that contains these images.
Microsoft has also published an update to address the cross-domain vulnerability discussed in SA04-163A. This vulnerability may allow an attacker to alter a web site to point to a different location. If the attacker can convince you to visit the site, they may be able to gain control of your machine.
Apply a patch
Microsoft has issued updates that resolve this problem. Obtain the appropriate update from Windows Update
Use caution with email attachments
Never open unexpected email attachments. Before opening an attachment, save it to a disk and scan it with anti-virus software. Make sure to turn off the option to automatically download attachments.
View email messages in plain text
Email programs like Outlook and Outlook Express interpret HTML code the same way that Internet Explorer does. Attackers may be able to take advantage of that by sending malicious HTML-formatted email messages.
Maintain updated anti-virus software
It is important that you use anti-virus software and keep it up to date. Most anti-virus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many anti-virus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.
In Microsoft Security Bulletin MS04-025, Microsoft describes a critical vulnerability in the way Internet Explorer processes .GIF and .BMP images. An attacker can use malicious images on a web page or in HTML-formatted email messages. If the attacker can convince a user to visit the web page, open the message, or otherwise view the image, the attacker may be able to gain control of the user’s machine.
There is also a vulnerability in the way Internet Explorer processes scripts. An attacker may be able to take advantage of frames to redirect users to a malicious web site.
More technical information about this issue is available in TA04-212A and Microsoft Security Bulletin MS04-025.
- Windows Security Updates for July 2004 – <http://www.microsoft.com/security/bulletins/200407_windows.mspx>
- Multiple Remote Code Execution Vulnerabilities in Microsoft Internet Explorer – <http://www.us-cert.gov/cas/techalerts/TA04-212A.html>
- Microsoft Security Bulletin MS04-025 – <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>
- US-CERT Computer Virus Resources – <http://www.us-cert.gov/other_sources/viruses.html>
- Understanding Anti-Virus Software – <http://www.us-cert.gov/cas/tips/ST04-005.html>
- Using Caution with Email Attachments – <http://www.us-cert.gov/cas/tips/ST04-010.html>
- Home Network Security – <http://www.cert.org/tech_tips/home_networks.html>
- Home Computer Security – <http://www.cert.org/homeusers/HomeComputerSecurity/
Author: Mindi McDowell. Feedback can be directed to the US-CERT Technical Staff.
Copyright 2004 Carnegie Mellon University. Terms of use
Last updated
Systems Affected These vulnerabilities affect the following versions of Microsoft Internet Explorer: Microsoft Internet Explorer…
Systems Affected Applications and systems that use the libpng library. Overview Several vulnerabilities exist in…
Systems Affected Microsoft Windows XP Overview Microsoft Windows XP Service Pack 2 (SP2) significantly improves…
Systems Affected The following Oracle applications are affected: Oracle Database 10g Release 1, version 10.1.0.2…
Systems Affected MIT Kerberos 5 versions prior to krb5-1.3.5 Applications that use versions of MIT…
Systems Affected Applications that process JPEG images on Microsoft Windows, including but not limited to…
This website uses cookies.