Windows MHTML Vulnerability Warning From Microsoft

Microsoft issued an advisory on a Windows security vulnerability today after exploit code for the bug went public.

The bug, which lies in the MIME Encapsulation of Aggregate HTML (MHTML) protocol handler, can be exploited to cause data leakage. Though proof-of-concept code for the vulnerability has already gone public, the company said it is unaware of any attempts to exploit the bug.

Fault Lies In MHTML Execution

“The impact of an attack on the vulnerability would be similar to that of server-side cross-site-scripting (XSS) vulnerabilities,” blogged Angela Gunn, security response communications manager for Microsoft Trustworthy Computing. “For instance, an attacker could construct an HTML link designed to trigger a malicious script and somehow convince the targeted user to click it.”

If a user clicked that link, the malicious script would run on the user’s computer for the rest of the current Internet Explorer session, and could be used to collect user information, spoof content displayed in the browser or for other acts, Gunn added.

According to the advisory, the vulnerability affects all supported editions of Microsoft Windows. The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. Even though proof-of-concept code is available, the bug is difficult for attackers to exploit in a successful and useful way, opined Andrew Storms, director of security operations for nCircle.

“To create a successful attack with this bug the attacker needs to entice a user to click on a specific URL and he also needs control over the user’s Web,” he said. “These factors, together with the fact that the mitigation is easy to install, make successful exploits less likely.

“The risk with this bug is not huge, especially since Microsoft has already provided easy and fairly safe mitigation techniques,” he added.

Microsoft offered a few workarounds to protect users. For example, users can follow instructions in the advisory to lock down the MHTML protocol and set Internet and local intranet security zone settings to high to block ActiveX controls and active scripting.

“This bug looks like a strong candidate for the regular patch process,” he added. “So far, there are no active exploitations. You also have to consider that the bug is in the Windows OS and it affects all versions of Windows, so testing is going to take some time. Microsoft is not going to rush out a patch just yet.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Google Digital Ad Network Ruled Illegal Monopoly By Judge

More bad news for Google. Second time in less than a year that some part…

15 hours ago

US State Dept Closes Office Flagging Russia, China Disinformation

Federal office that tackled misinformation and disinformation from hostile nations is closed down, after criticism…

17 hours ago

Nvidia CEO Jensen Huang Makes Surprise Visit To China

After Nvidia admits it will take $5.5 billion charge as Trump export limits of slower…

17 hours ago

Former CISA Chief Chris Krebs Targetted By Trump Executive Order

Trump continues to target his former CISA head, signing a new executive order targetting Chris…

18 hours ago

Temu, Shein To Increase US Prices After Trump’s Tariffs

Two Chinese retailers warn customers in America that prices will increase next week, as Trump's…

22 hours ago

Tesla Whistleblower Wins Legal Ruling Against Elon Musk

Engineer Cristina Balan wins latest round in her long-running defamation claim against Elon Musk's EV…

23 hours ago