Windows MHTML Vulnerability Warning From Microsoft

Microsoft issued an advisory on a Windows security vulnerability today after exploit code for the bug went public.

The bug, which lies in the MIME Encapsulation of Aggregate HTML (MHTML) protocol handler, can be exploited to cause data leakage. Though proof-of-concept code for the vulnerability has already gone public, the company said it is unaware of any attempts to exploit the bug.

Fault Lies In MHTML Execution

“The impact of an attack on the vulnerability would be similar to that of server-side cross-site-scripting (XSS) vulnerabilities,” blogged Angela Gunn, security response communications manager for Microsoft Trustworthy Computing. “For instance, an attacker could construct an HTML link designed to trigger a malicious script and somehow convince the targeted user to click it.”

If a user clicked that link, the malicious script would run on the user’s computer for the rest of the current Internet Explorer session, and could be used to collect user information, spoof content displayed in the browser or for other acts, Gunn added.

According to the advisory, the vulnerability affects all supported editions of Microsoft Windows. The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. Even though proof-of-concept code is available, the bug is difficult for attackers to exploit in a successful and useful way, opined Andrew Storms, director of security operations for nCircle.

“To create a successful attack with this bug the attacker needs to entice a user to click on a specific URL and he also needs control over the user’s Web,” he said. “These factors, together with the fact that the mitigation is easy to install, make successful exploits less likely.

“The risk with this bug is not huge, especially since Microsoft has already provided easy and fairly safe mitigation techniques,” he added.

Microsoft offered a few workarounds to protect users. For example, users can follow instructions in the advisory to lock down the MHTML protocol and set Internet and local intranet security zone settings to high to block ActiveX controls and active scripting.

“This bug looks like a strong candidate for the regular patch process,” he added. “So far, there are no active exploitations. You also have to consider that the bug is in the Windows OS and it affects all versions of Windows, so testing is going to take some time. Microsoft is not going to rush out a patch just yet.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Virgin Media O2 To Invest £700m To ‘Transform’ 4G, 5G Network

Virgin Media O2 confirms it will invest £2m a day for new mobile masts, small…

22 hours ago

Tesla Cybertruck Deliveries On Hold Due To Faulty Side Trim

Deliveries of Telsa's 'bulletproof' Cybertruck are reportedly on hold, amid user complaints side trims are…

23 hours ago

Apple Plots Live Translation Option For AirPods – Report

New feature reportedly being developed by Apple for iOS 19, that will allow AirPods to…

24 hours ago

Binance Token Rises After Trump Stake Report

Binance BNB token rises after WSJ report the Trump family is in talks to secure…

2 days ago

iRobot Admits ‘Substantial Doubt’ Over Continued Operation

After failed Amazon deal, iRobot warns there is “substantial doubt about the Company's ability to…

2 days ago

Meta’s Community Notes To Use X’s Algorithm

Community Notes testing across Facebook, Instagram and Threads to begin next week in US, using…

2 days ago