Personal Tech Pipeline | Windows Security | New IE Bug Opens XP SP2 To Attack

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

September 16, 2005

New IE Bug Opens XP SP2 To Attack



Courtesy of TechWeb News

Microsoft's Internet Explorer browser sports a flaw that hackers could use to launch a remote attack on Windows XP SP2, eEye Digital Security said Thursday.

"The flaw is remotely exploitable," said Mike Puterbaugh, eEye's director of product management.

Although eEye has notified Microsoft of the bug -- and Microsoft has confirmed receipt of the report -- no patch is available. According to eEye, that's not unusual: on average, Microsoft has taken 132 days to patch holes that the Aliso Viejo, Calif.-based security vendor has reported since February 2004.

eEye takes the unique step of logging its reports to Microsoft, then showing the number of days since the vulnerability was confirmed by the Redmond company. After 60 days, it considers a patch "overdue."

Internet Explorer, says eEye, has at least five other critical, but unpatched, vulnerabilities, including ones reported 15, 46, 129, 134, and 171 days ago.

Microsoft has been patching IE regularly, but is having trouble keeping up with the browser's vulnerabilities. In August, it fixed three bugs in the browser, and since the first of the year, has patched IE five out of nine months.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
Unleash the Power & Opportunity of Grid Computing
Experts will identify trends in grid computing, provide
examples and examine solution options.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Critical Steps for a Successful VoIP Deployment
Enterprises expect voice and data network convergence to reduce management complexity, drive down operating costs, and enable more efficient communications. Use this "how-to" guide to effectively assess the current state of your network.

Block or Secure IM Use
IM threats up 250%. Protect your corporate network. Free Download.

Network & Application Performance doc downloads
Free white papers, buyers guide, application notes, industry articles, and more. NetScout's nGenius Solution provides network performance management and application monitoring for complex enterprise networks.

THE EVENT for Email Security, Policy, Compliance
Learn the latest on Email Security, Systems, Technology, Privacy, Policy and Compliance at INBOX: The Email Event, May 31-June 1, 2006. Meet industry leaders and your peers to debate and discuss best practices, products and cost-effective systems.

Security Within - Configuration based Security
Configuration and policy based security systems are a pro-active way to defend against IT security attacks. Click here to request our white papers, "Security Within - Configuration based Security" and "Policy Management vs. Vulnerability Scanning".


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
Stellent eSeminar "Approaches to Metadata Design" on March 23
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia