The vulnerability in internet security explorer is caused by the memory corruption resulting from the way Internet Explorer handles DHTML Data Bindings and can be overcome by the following work around
· Block access to the vulnerable code in MSHTML.dll via OLEDB, protecting against current attacks
· apply the most secure configuration against this specific vulnerability.
Work around :
1. Use a System Access Control List (SACL) to disable OLEDB32.dll for fewer applications(applies only to Windows Vista and later versions of Windows)
2. Disable the "Row Position" functionality of OLEDB32.dll
3. Unregister OLEDB32.dll
4. Use SACL entries to disable OLEDB32.dll
Monday, January 5, 2009
Internet explorer threat
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment