Microsoft Security Bulletin MS08-078 - Critical

JackMDS

Elite Member
Super Moderator
Oct 25, 1999
29,538
418
126
Affect IE6 and IE7 on most Windows OS'

This link to the download page.

http://www.microsoft.com/techn...bulletin/ms08-078.mspx



mechBgon adds: there are also new extremely-important security updates for Opera and FireFox on all platforms, so here's links to those as well. It's a browser-patching conjunction of the planets! :D

  • Opera has been updated to 9.63 (download links) to fix "extremely severe" security vulnerabilities.
  • FireFox has just been updated to 3.0.5 (download links), or 2.0.0.19 for FF2 users (download links). If you use FireFox 2, it's time to move on to FireFox 3, because there will be no further security updates for FF2 and your anti-phishing capabilites will cease.
  • Secunia has a free checkup utility for home users of Windows. It'll find vulnerable software you have installed, and link you to patches that fix the problems. They've got both an installable version, and a browser-based one: http://secunia.com/vulnerability_scanning/

    The bad guys routinely use those vulnerabilities to infect computers, even if your browser itself is patched, so take advantage of this simple way of eliminating publicly-known vulnerabilities in stuff like Adobe Reader, Flash Player, QuickTime, WinAmp, and many other types of software.
Also, if you happen to have Windows Vista, here's how to enable your Data Execution Prevention (DEP) for Internet Explorer 7. DEP largely mitigates the vulnerability that this sticky discusses. Here's how to get it switched on:

  1. Right-click on an Internet Explorer icon, and choose Run as Administrator from the right-click menu (you'll only have to do this once).
  2. In Internet Explorer, click Tools > Internet Options, and then click the Advanced tab.
  3. Scroll down and put a checkmark in Enable memory protection to help mitigate online attacks (pic :camera:). This checkbox can only be changed if you use Run as Administrator. Don't ask, I don't know why either ;)
  4. Close Internet Explorer. DEP is now activated. You don't need to do this for 64-bit IE7, because DEP is mandatory on all 64-bit processes in Vista x64.

Possible side effects of DEP in IE7? Some browser add-ons might crash. Older versions of Sun Java Runtime did, for example. This is undoubtedly why DEP's not enabled by default.

What else? If you use Vista, then leaving User Account Control (UAC) enabled allows IE to operate in Protected Mode, which basically mitigates the vulnerability that this sticky is discussing.