eEye’s Temporary Workaround 1.0
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.
|
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer. The exploit pertains to an unpatched vulnerability that has been released on various public mailing lists.
This issue affects any Windows operating system running Internet Explorer versions 5.01 SP4 through 6.0 SP1. The vulnerability results from the method in which Internet Explorer handles HTML Objects. This flaw allows for remote code to be executed on the target system. If successfully exploited, an attacker will only have the rights of the currently logged on user. System Administrators should be careful to not use Administrator accounts for general system use.
Currently, there have been numerous reports of this vulnerability being used on various websites in attempts to install Spyware and remote control "bot" software for use in Distributed Denial of Service (DDoS) attacks.
The recommended action required to protect systems against this attack is to disable Active Scripting from within Internet Explorer.
eEye Digital Security's Research Team has confirmed that eEye’s Blink host-based intrusion prevention solution protects from the exploitation of this Internet Explorer flaw without requiring invasive firewalling, or the presence of any patch. Current Blink customers should ensure that the Application Protection is enabled in their Blink policies.
Additionally, eEye Digital Security’s Research Team has released a workaround for the vulnerability as a temporary measure for customers who have not yet installed Blink. eEye’s Temporary Workaround is a free and very useful security patch for Internet Explorer. This workaround is not meant to replace the forthcoming Microsoft patch, rather it is intended as a temporary protection against this flaw. Organizations should only install this patch if they are not able to disable Active Scripting as a means of mitigation.
Requirements
tags internet explorer eeye digital active scripting research team team has this patch disable active this flaw digital security the vulnerability from the against this
Download eEye’s Temporary Workaround 1.0
Download eEye’s Temporary Workaround 1.0
Authors software
SecureIIS Personal Edition 2.0.4
eEye Digital Security
SecureIIS™ Web Server Protection - Personal Edition provides unmatched firewall, intrusion and application protection to guard your Microsoft web servers against worms, buffer overflows, hybrid attacks and other types of known and unknown threats.
eEye’s Temporary Workaround 1.0
eEye Digital Security
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.
Patch for ANI Cursor Vulnerability
eEye Digital Security
An unspecified vulnerability exists within Microsoft Windows which may possibly allow for a remote attacker to execute arbitrary code under the context of the logged in user.
Similar software
eEye’s Temporary Workaround 1.0
eEye Digital Security
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.
Patch for ANI Cursor Vulnerability
eEye Digital Security
An unspecified vulnerability exists within Microsoft Windows which may possibly allow for a remote attacker to execute arbitrary code under the context of the logged in user.
Determina Fix for CVE-2006-1359 1.0
Determina
Based on the same technology used in the VPS LiveShield product, Determina has engineered a standalone fix that provides free and immediate protection to users worldwide that need to protect systems from related attacks until such time as Microsoft issues its own patch.
Browse Safetly 1.0
Angel Tsvetkov
Dynamicly turn ON/OFF enable disable active scripting and others Internet Explorer security settings without close any opened internet explorer windows.
IESecure 0.1
Maxthon
A critical vulnerability has been found in Internet Explorer which is caused due to a boundary error in the handling of certain attributes in the IFRAME, FRAME, and EMBED HTML tags.
Windows Cumulative Patch for Internet Explorer Aug
Microsoft
August 2002, Cumulative Patch for Internet Explorer (Q323759) eliminates all previously addressed security vulnerabilities affecting Internet Explorer, well as additional newly discovered bugs.
Security & Privacy Complete 3.1.6
CMIA Complete AsA
Security & Privacy Complete is mainly a security tool for Windows.
DCOMbobulator 2.01
GRC
What is DCOM?
Windows employs a component-based system to help programmers manage Windows' complexity.
Security System Analyzer 1.5.1
Security-database.com
Security System Analyzer is a tool designed to check your system for the latest security updates.
AMUST eCondom 1.0
AMUST Software
AMUST eCondom for Microsoft Internet Explorer is a Free security utility for safe Internet browsing.
Other software in this category
VisualICE Report Utility 4.7
Visualize Software
VisualICE Report Utility - so what do you do if you would like to know more about what the hacker tried to do, who he is, where he`s from or how to report him to the proper authorities?
That`s where VisualICE Report Utility comes in.
Gopher Smoker .06
PivX Sollutions, LLC
PivX Solutions, LLC released a program appropriately named `Gopher Smoker`.
Bouncer for Windows 1.0 RC6
Chris Mason
Bouncer is a network tool which allows you to bypass proxy restrictions and obtain outside connections from an internal LAN.
Slap 1.2.2.0
Security Software
If your like me you run firewall software that tells you when someone tries to access your system.
VisualZone Report Utility 5.7
Visualize Software
VisualZone Report Utility is a report utility and an intrusion analyser for ZoneAlarm and ZoneAlarm Pro.