Forum Moderators: open
And now, there is an exploit that takes advantage of it. It simply uses Application.Shell instead of ADODB.Stream (the ActiveX control disabled by the last "patch") to do its dirty work.
CNET News:
[news.com.com...]
The Register:
[securityfocus.com...]
The updated exploit code:
[seclists.org...]
So, once again, anyone running IE with Javascript enabled is completely vulnerable.
Regards,
John
There has been a lot of noise about this, but Microsoft have never claimed to have already solved the issue with the vulnerability. They are still in the process of testing a solution.