Microsoft Issues 'Fix It' as It Investigates MHTML Vulnerability in IE

Microsoft released Security Advisory 2501696 in response a scripting vulnerability in Internet Explorer that affects all versions of Windows.

The security hazard is found in the MIME Encapsulation of Aggregate HTML (MHTML) protocol handler. The attach mechanism is similar to a server-side cross-site-scripting (XSS) exploit, in which a malicious script could run on a user's computer after clicking on a link.

While this vulnerability could be exploited by hackers, the chances of an attack are slim, according to some software security analysts.

"At first glance today's advisory looks grim because it affects every supported Windows platform," wrote Andrew Storms, director of information and technology at software security firm nCircle, in a released statement.  "However, even though the proof of concept code is public, carrying out an attack using this complicated cross site scripting-like bug will not be easy."

While there currently is no patch to fix the vulnerability, Microsoft suggested a workaround. This mitigation approach disables MHTML handler scripting by setting all corresponding keys in the Windows registry. Microsoft issued a "Fix it" in a KnowledgeBase article to automate the workaround.

Wolfgang Kandek, CTO of Qualys, offered another option to avoid the vulnerability: use an alternative browser.

"While the vulnerability is located in a Windows component, Internet Explorer is the only known attacker vector," Kandek wrote in a blog posting.  "Firefox and Chrome are not affected in their default configuration, as they do not support MHTML without the installation of specific add-on modules."

The hole was first brought to the attention by individuals on the WooYun Web site. This is the same site that divulged information about the vulnerability in the CSS handler of Internet Explorer in December.

Coupled with a handful of security concerns last month, Microsoft has been busy with multiple vulnerabilities as of late. "2011 is not off to an auspicious start for Microsoft's security staff," wrote Storms. "In early January Jonathan Ness posted an explanation of five public security bugs Microsoft was tracking to the SRD blog. Today, just two short weeks later, we have another one to add to the list."

About the Author

Chris Paoli (@ChrisPaoli5) is the associate editor for Converge360.

Featured

  • ClassVR headsets

    Avantis Education Launches New Headsets for ClassVR Solution

    Avantis Education recently introduced two new headsets for its flagship educational VR/AR solution, ClassVR. According to a news release, the Xcelerate and Xplorer headsets expand the company’s offerings into higher education while continuing to meet the evolving needs of K–12 users.

  • Abstract AI circuit board pattern

    Nonprofit LawZero to Work Toward Safer, Truthful AI

    Turing Award-winning AI researcher Yoshua Bengio has launched LawZero, a nonprofit aimed at developing AI systems that prioritize safety and truthfulness over autonomy.

  • blue AI cloud connected to circuit lines, a server stack, and a shield with a padlock icon

    Report: AI Security Controls Lag Behind Adoption of AI Cloud Services

    According to a recent report from cybersecurity firm Wiz, nearly nine out of 10 organizations are already using AI services in the cloud — but fewer than one in seven have implemented AI-specific security controls.

  • magnifying glass highlighting a human profile silhouette, set over a collage of framed icons including landscapes, charts, and education symbols

    New AI Detector Identifies AI-Generated Multimedia Content

    Amazon Web Services and DeepBrain AI have launched AI Detector, an enterprise-grade solution designed to identify and manage AI-generated content across multiple media types. The collaboration targets organizations in government, finance, media, law, and education sectors that need to validate content authenticity at scale.