Two new vulnerabilities have been discovered in Internet Explorer which allow a complete bypass of security and provide system access to a computer, including the installation of files on someone's hard disc without their knowledge, through a single click.
The holes were discovered from analysis of an existing link on the internet and a fully functional demonstration of the exploit have been produced and been shown to affect even fully patched versions of Explorer.
It has been rated "extremely critical" by security company Secunia, and the only advice is to disable Active Scripting support for all but trusted websites.
The discovery stems from a Dutch researcher who was sent an internet link which he was warned used unknown Explorer vulnerabilities to install adware on his computer. He found it did and embarked on a detailed analysis of the link, which demonstrates an extremely sophisticated use of encrypted code to bypass the web browser's security.
In simple terms, the link uses an unknown vulnerability to open up a local Explorer help file - ms-its:C:\WINDOWS\Help\iexplore.chm::/iegetsrt.htm. It delays executing anything immediately but instead uses another unknown vulnerability to run another file which in turn runs some script.
This script is then used to run more script, and finally that script is used to run an exploit that Microsoft has been aware of since August 2003 but has not patched.
That exploit - Adodb.stream - has not been viewed as particularly dangerous, since it only works when the file containing the code is present on the user's hard disc. The problem comes in the fact that the Help file initially opened is assumed to be safe since it is a local file and so has minimal security restrictions.
By using the unknown exploits, code is installed within the help file window, all security efforts are bypassed, and the Adodb.stream exploit is then used to download files on the internet direct to the hard disc.
What this means in reality is that if you click on a malicious link in an e-mail or on the internet, a malicious user can gain complete control of your PC very quickly.
Kieren McCarthy writes for Techworld.com