Seriously, there's a major security hole in Internet Explorer that also opens up vulnerabilities in other browsers. Even if you rarely if ever use IE, you need to secure your system if you're running Windows. If you don't know how to,
Yahoo! Tech has a handy guide. It's fairly major, several popular websites have been hijacked, one well known
(
Read more... )
Comments 32
Those of you fighting the "can we switch to a better bit of software please" fight may find this useful extra ammo. Those of you just putting up with using IE at work, seriously, start putting pressure on bosses and IT.
Using IE could really mess up your company's bottom line.
Reply
Said [third-party security advisor] Mr Ferguson: "If users can find an alternative browser, then that's good mitigation against the threat."
But Microsoft counselled against taking such action.
"I cannot recommend people switch due to this one flaw," said John Curran, head of Microsoft UK's Windows group.
What about all the other flaws?
and what's the vulnerability that affects PDF files?
Reply
Or something.
MS has to say don't switch. Believing them is up to the guy paying the bills.
Reply
(The comment has been removed)
The actual problem is in the IE XML buffer, which Opera apparently uses. If that means stuff to you, great.
Reply
Reply
Reply
The thing is of course that while in this instance Opera trusted Windows not to be vulnerable to buffer overflow attacks when it was, there's nothing to say that Firefox or Chrome or whatever other browser isn't also trusting some other Windows service which is vulnerable.
Unfortunately you sort of _have_ to trust some of the services of the OS you're running on, and while some companies trust very few of them (Opera for instance does a whole load of stuff on its own, which is why it looks slightly odd and I was surprised to see this) they're all going to trust a few. In this instance Opera is vulnerable and other browsers which don't use that service aren't, but that's not indicative of some sort of long-term issue with Opera IMO.
Reply
Reply
Reply
That's slightly misleading. The pretend-to-be is user-adjustable but it's mainly useragent stuff and possibly some box-model interpretation. From what I understand, the vulnerabilities from XML rendering are not due to "default behaviour" in the same sense; I doubt there is another XML rendering option. (I may be wrong, I don't touch desktop Opera).
Reply
Reply
Leave a comment