Internet Explorer 8 Under Threat In India: Cyber Agency
Facebook Twitter google+ RSS Feed

Internet Explorer 8 Under Threat In India: Cyber Agency

By SiliconIndia   |   Tuesday, 27 May 2014, 13:45 Hrs
44
cmt right
48
Comment Right
71
cmt right
11
cmt right
Printer Print Email Email


New Delhi: Cyber security sleuths have alerted Indian users against a "high" level virus activity in a select version of popular Microsoft-owned web browser - the Internet Explorer.

The vulnerability, which once activated may compromise the privacy of a user's computer system, has been detected in the Microsoft Internet Explorer version "8" by the Computer Emergency Response Team of India, the country's nodal agency to combat hacking, phishing and to fortify security-related defenses of the Indian Internet domain.

The severity of the malfunctioning has been categorized as "high" by the agency.



"A use-after-free vulnerability has been reported in Microsoft Internet Explorer (version 8) which could allow an unauthenticated remote attacker to execute arbitrary code on a target system.

"The vulnerability exists due to improper handling of CMarkup objects within "CMarkup::CreateInitialMarkup". An unauthenticated, remote attacker could exploit this issue by enticing a user to view specially crafted HTML document triggering a memory corruption," the advisory said.

It added that the successful exploitation of this malfunctioning "could allow the attacker to execute arbitrary code on the system with the privileges of the targeted user."

"This essentially means that if the malfunctioning gets activated it could harm the privacy and private information of the users' computer," a cyber security official said.

The agency has asked Internet users to upgrade their Microsoft Internet explorer to version "11". Some of the other counter-measures suggested by the agency include deploying and configuring the Microsoft Enhanced Mitigation Experience Toolkit for Internet Explorer, setting the Internet security zone to "high" to block ActiveX controls and active scripting and configuring Internet Explorer to prompt before running active scripting or to disable active scripting in the Internet and local intranet security zone.



READ MORE: Google Gets Its Hands On Another Startup and The Most appreciated Apps on iOS



Write your comment now
Submit Reset
SPOTLIGHT