eEye’s Temporary Workaround 1.0
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.
|
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer. The exploit pertains to an unpatched vulnerability that has been released on various public mailing lists.
This issue affects any Windows operating system running Internet Explorer versions 5.01 SP4 through 6.0 SP1. The vulnerability results from the method in which Internet Explorer handles HTML Objects. This flaw allows for remote code to be executed on the target system. If successfully exploited, an attacker will only have the rights of the currently logged on user. System Administrators should be careful to not use Administrator accounts for general system use.
Currently, there have been numerous reports of this vulnerability being used on various websites in attempts to install Spyware and remote control "bot" software for use in Distributed Denial of Service (DDoS) attacks.
The recommended action required to protect systems against this attack is to disable Active Scripting from within Internet Explorer.
eEye Digital Security's Research Team has confirmed that eEye’s Blink host-based intrusion prevention solution protects from the exploitation of this Internet Explorer flaw without requiring invasive firewalling, or the presence of any patch. Current Blink customers should ensure that the Application Protection is enabled in their Blink policies.
Additionally, eEye Digital Security’s Research Team has released a workaround for the vulnerability as a temporary measure for customers who have not yet installed Blink. eEye’s Temporary Workaround is a free and very useful security patch for Internet Explorer. This workaround is not meant to replace the forthcoming Microsoft patch, rather it is intended as a temporary protection against this flaw. Organizations should only install this patch if they are not able to disable Active Scripting as a means of mitigation.
Requirements
tags
internet explorer eeye digital active scripting research team team has this patch disable active this flaw digital security the vulnerability from the against this

Download eEye’s Temporary Workaround 1.0
Download eEye’s Temporary Workaround 1.0
Similar software
eEye’s Temporary Workaround 1.0
eEye Digital Security
eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.
W32.Welchia.Worm Removal Tool 1.06
Symantec
W32.
Essential Security Suite 2.0
Essential Security Software
Essential Security Suite provides P2P digital rights management (DRM), file encryption, digital signatures, secure file deletion and more.
Data Security Crawler 1.8.3.8
Veriphide
Data Security Crawler is a useful data protection utility that will come to your help.
Patch for ANI Cursor Vulnerability
eEye Digital Security
An unspecified vulnerability exists within Microsoft Windows which may possibly allow for a remote attacker to execute arbitrary code under the context of the logged in user.
X-Ways Security 1.3
X-Ways Software
X-Ways Security is the shredder for the digital age.
Ashampoo Security Pack 1.00
ashampoo GmbH & Co. KG
Ashampoo Security Pack is the control, installation and launch centre for all your Windows security needs.
FoolProof Security 5.0
Horizon DataSys Inc
FoolProof Security is powerful, and very easy to use.
Extended Security Update Inventory Tool 4.5
Microsoft
The SMS Extended Security Update Inventory tool is a scan utility built for the sole purpose of helping customers determine SMS client PCs that may need security updates that are not detectable using the existing SMS Security Update Inventory Tool built on MBSA.
TargetExpress 4.20
MCW Technologies, Inc.
TargetExpress is a target printing software.