Look out, Internet Explorer users. eWeek reports that Microsoft will release a patch for a zero-day IE vulnerability later today. Apparently, the vulnerability has to do with IE's data binding function, and malicious hackers have already managed to exploit it. Here's the skinny in Microsoft's words:
The vulnerability exists as an invalid pointer reference in the data binding function of Internet Explorer. When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, leaving the potential to access the deleted object's memory space. This can cause Internet Explorer to exit unexpectedly, in a state that is exploitable.
eWeek quotes Microsoft's Christopher Budd as saying, "At this time, we are aware only of attacks that attempt to use this vulnerability against Windows Internet Explorer 7." That sounds like one of the few occurrences when running IE6 might actually be a good thing, although you're probably still better off running a non-Microsoft browser like Firefox, Safari, Chrome, or Opera.
Until the fix comes out, Microsoft cautions to watch out for instant-message file transfers and e-mail attachments. Since exploiting the hole can give a hacker the same rights as the user, not running with administrative privileges (as in Vista with UAC enabled) might help, too.
Update: The patch is now out. You can download it from this page on Microsoft's website.
|Gigabyte has two A320 boards for bread-and-butter Ryzen builds||14|
|MSI GTX 1080 Ti Armor 11G is the first custom card on e-tail shelves||6|
|Google points deep-learning machines at audio effect subtitles||4|
|Throw a Quadro card on Gigabyte's Z270X-Designare||11|
|Deals of the week: an RX 480 4GB for $150 and more||24|
|Dell UltraSharp 32 8K embarrasses 4K monitors||60|
|EVGA readies a Hybrid Waterblock for Nvidia GP102 cards||7|
|Elgato Stream Deck lets streamers play news desk||7|
|Puppy Day Shortbread||27|
|I need this because of reasons.||+41|