eEye’s Temporary Workaround 1.0

eEye’s Temporary Workaround 1.0 Screenshot eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.

Developer:   eEye Digital Security
      software by eEye Digital Security →
Price:  0.00
License:   Freeware
File size:   0K
Language:   
OS:   Windows XP/Vista (?)
Rating:   0 /5 (0 votes)

eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer. The exploit pertains to an unpatched vulnerability that has been released on various public mailing lists.

This issue affects any Windows operating system running Internet Explorer versions 5.01 SP4 through 6.0 SP1. The vulnerability results from the method in which Internet Explorer handles HTML Objects. This flaw allows for remote code to be executed on the target system. If successfully exploited, an attacker will only have the rights of the currently logged on user. System Administrators should be careful to not use Administrator accounts for general system use.

Currently, there have been numerous reports of this vulnerability being used on various websites in attempts to install Spyware and remote control "bot" software for use in Distributed Denial of Service (DDoS) attacks.

The recommended action required to protect systems against this attack is to disable Active Scripting from within Internet Explorer.

eEye Digital Security's Research Team has confirmed that eEye’s Blink host-based intrusion prevention solution protects from the exploitation of this Internet Explorer flaw without requiring invasive firewalling, or the presence of any patch. Current Blink customers should ensure that the Application Protection is enabled in their Blink policies.

Additionally, eEye Digital Security’s Research Team has released a workaround for the vulnerability as a temporary measure for customers who have not yet installed Blink. eEye’s Temporary Workaround is a free and very useful security patch for Internet Explorer. This workaround is not meant to replace the forthcoming Microsoft patch, rather it is intended as a temporary protection against this flaw. Organizations should only install this patch if they are not able to disable Active Scripting as a means of mitigation.

Requirements
  • This patch only supports Internet Explorer 5.01 through 6.0 on Windows NT 4.0, Windows 2, Windows XP, and Windows Server 2003

    tags internet explorer  eeye digital  active scripting  research team  team has  this patch  disable active  this flaw  digital security  the vulnerability  from the  against this  

    eEye’s Temporary Workaround 1.0 screenshot


    Download eEye’s Temporary Workaround 1.0

     Download eEye’s Temporary Workaround 1.0


    Similar software

    eEye’s Temporary Workaround 1.0 eEye’s Temporary Workaround 1.0
    eEye Digital Security

    eEye Digital Security is advising customers to the existence of exploit code that targets a critical security vulnerability in Microsoft Internet Explorer.

    Patch for ANI Cursor Vulnerability Patch for ANI Cursor Vulnerability
    eEye Digital Security

    An unspecified vulnerability exists within Microsoft Windows which may possibly allow for a remote attacker to execute arbitrary code under the context of the logged in user.

    Determina Fix for CVE-2006-1359 1.0 Determina Fix for CVE-2006-1359 1.0
    Determina

    Based on the same technology used in the VPS LiveShield product, Determina has engineered a standalone fix that provides free and immediate protection to users worldwide that need to protect systems from related attacks until such time as Microsoft issues its own patch.

    IESecure 0.1 IESecure 0.1
    Maxthon

    A critical vulnerability has been found in Internet Explorer which is caused due to a boundary error in the handling of certain attributes in the IFRAME, FRAME, and EMBED HTML tags.

    Browse Safetly 1.0 Browse Safetly 1.0
    Angel Tsvetkov

    Dynamicly turn ON/OFF enable disable active scripting and others Internet Explorer security settings without close any opened internet explorer windows.

    Windows Cumulative Patch for Internet Explorer Aug Windows Cumulative Patch for Internet Explorer Aug
    Microsoft

    August 2002, Cumulative Patch for Internet Explorer (Q323759) eliminates all previously addressed security vulnerabilities affecting Internet Explorer, well as additional newly discovered bugs.

    DCOMbobulator 2.01 DCOMbobulator 2.01
    GRC

    What is DCOM? Windows employs a component-based system to help programmers manage Windows' complexity.

    Security & Privacy Complete 3.1.6 Security & Privacy Complete 3.1.6
    CMIA Complete AsA

    Security & Privacy Complete is mainly a security tool for Windows.

    VNC Flaw Test 2.0 VNC Flaw Test 2.0
    IntelliNavigator Inc

    VNC Flaw Test - Test your VNC installations for vulnerability It was almost over a month ago that we discovered a major vulnerability in VNC 4.

    Security System Analyzer 1.5.1 Security System Analyzer 1.5.1
    Security-database.com

    Security System Analyzer is a tool designed to check your system for the latest security updates.