Forum Moderators: open
A vulnerability has been discovered in Internet Explorer, which can be exploited by malicious people to disclose potentially sensitive information.The vulnerability is caused due to an error in the handling of redirections for URLs with the "mhtml:" URI handler. This can be exploited to access documents served from another web site.
These reports are technically inaccurate: the issue concerned in these reports is not in Internet Explorer 7 (or any other version) at all. Rather, it is in a different Windows component, specifically a component in Outlook Express. While these reports use Internet Explorer as a vector the vulnerability itself is in Outlook Express.Microsoft Security Response Center [blogs.technet.com]
"Your browser is vulnerable! We were able to order a pizza from Papa John's, so that's absolute proof that we could steal confidential data from your bank.
P.S. Sorry we don't actually demonstrate stealing info from your bank, but were totally confident it could happen tomorrow."
I've got bigger worries about my 14-year-old swiping a twenty out of my wallet while I'm in the shower... seems a lot higher priority than wringing my hands over this exploit.
then Outlook Express needs to be fixed ASAP.
I would almost swear that the IE blog initally referered to this is as a 3rd party object that is used in outlook express. Looking back at that blog entry now the 3rd party words are gone.
If it was a 3rd party vendor then I'll bet that vendor is feeling some pretty nice heat at the moment. If not then its somewhat interesting to see one MS team point to another team and say "its their bug"... The bug belongs to both teams, that's what happens when the os and the applications are tightly integrated.
Control Panel -> Add/Remove Windows Components. Uncheck Outlook Express. Click Next.
Unfortunately, that does not completely remove Outlook Express. Or at least not the component that is causing this vulnerability.
The test for the vulnerability still fails. (Or succeeds, depending on your viewpoint...)
There is a complex manual removal procedure at the Microsoft website. It involves removing a large number of directories and registry keys. A number of spyware/adware removal tools also purport to completely remove Outlook Express.
I've done a bit more poking around, and I think that NEITHER of the characterizations of where the problem really lies (MSIE, Outlook Express) may be correct. I think this is a component further-embedded in Windows. A Symantec write-up on a similar problem suggest that disabling the mhtml handler may adversely affect the help system.
Control Panel -> Add/Remove Windows Components. Uncheck Outlook Express. Click Next.
Unfortunately, that does not completely remove Outlook Express. Or at least not the component that is causing this vulnerability.
This won't ever work, you can't uninstall it, just like you can't uninstall IE. The OS requires it for some functionality. Although unistall instructions do exist some of the underlining layers will always be there including the mhtml handler.
[edited by: Demaestro at 10:11 pm (utc) on Oct. 23, 2006]
But that is like saying if someone looks over your shoulder then they could get your pin number at a cash machine.
If someone can post here with real-life experience of this bug affecting them then that would be worth talking about.
As it is you probably have more chance of winning the lottery - but that isn't newsworthy is it.
I am sick of this sort of stuff ending up on the front page of webmasterworld - please someone post an experience of being hacked/spoofed or something similar. Otherwise please choose something else to get news from - this is not it.
The other thing I would check is.. the Internet.
Being connected to the Internet may severely affect your security - the fix... don't browse the web, uninstall email software and web browsing software as well just in case they can get you using telepathy. Even better turn off your computer.
Sorry, just joking - but seriously don't panic it isn't a new problem and not one currently being exploited.
[edited by: KPosition at 10:36 pm (utc) on Oct. 24, 2006]