For the most part, Storms saw the 10 vulnerabilities as "pretty typical IE bugs. Except for [CVE-2010-0806], none of them are particularly troublesome, or no more than we've come to expect." CVE-2010-0806 is the Common Vulnerabilities & Exposure ID for the vulnerability that prompted the rush, or "out-of-band," update.And that vulnerability received most of the attention today from Storms and other researchers, including HD Moore, the creator of the Metasploit framework and chief security officer at security company Rapid7, which manages the open-source Metasploit project. According to Moore, Microsoft's out-of-band hand was forced when a Taiwanese researcher nicknamed "Nanika" revamped public exploit code so that it worked reliably against not only IE6, but also the newer IE7. "Before, Microsoft said, 'Not that big a deal,' but then the facts changed and they say, 'Sorry, this does affect IE7 reliably.' They changed their mind." When Microsoft first warned customers of the memory corruption flaw in the "iepeers.dll" file, it said that attacks were aimed only at IE6 users, and that Protected Mode in IE7 would help protect users of that version. Protected Mode is a pseudo-sandbox that tries to keep attack code from escaping the browser to modify, add or delete data elsewhere on the PC. Microsoft said nothing of that protection today, and rated the vulnerability as critical for both IE6 and IE7. The bug had been reported to Microsoft by ADLab of VenusTech, a Chinese security firm based in Beijing, probably in January or early February, said nCircle's Storms. According to the date stamps on the iepeers.dll files for the various browsers, Microsoft had completed the fix -- and passed it on to internal testing -- no later than Feb. 26 for IE6 and March 12 for IE7. As Microsoft said both today and earlier, the iepeers.dll vulnerability does not affect IE8.
"I'm not surprised that Microsoft released the update," said Moore. "Working exploit code has consistently accelerated Microsoft's update process." As late as yesterday, other researchers had expressed surprise that Microsoft was able to craft a fix so quickly. "They focus on IE bugs more than anything else, because they are so high profile," said Moore."And Microsoft can actually fix things pretty quickly, within a week or two or three," he continued. "They generally address [bugs] quickly, but then hold off until its widely exploited. Otherwise, they wait until the next release." MS10-018 can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through Windows Server Update Services. Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org . Read more about security in Computerworld's Security Knowledge Center. Original story - http://www.computerworld.com/s/article/9174432/Microsoft_patches_10_critical_IE_bugs