The information in this article applies to:
SUMMARY
Microsoft has made an update available that addresses a potential security issue relating to the use of the Document.ExecCommand() method when invoked on an IFrame. When you visit a Web site, this issue may enable a malicious Web site operator to read files on your computer, although the name and location of the file would have to be known to exploit this issue. http://www.microsoft.com/windows/ie/security/default.asp http://www.microsoft.com/security/bulletins/ms99-042.aspUpdates are available for the following products:
Q226325 Update Available for MSHTML Security Issues in Internet Explorer Q242542 Download Behavior Vulnerability in Internet Explorer 5For additional information about these issues, please see the following Microsoft Web sites: http://www.microsoft.com/security/bulletins/MS99-012.asp http://www.microsoft.com/security/bulletins/ms99-040.aspNote that this issue does not occur in Internet Explorer 5.01. MORE INFORMATION
This fix blocks the execCommand only in cases where it is being used cross-domain and from script. http://www.microsoft.com/msdownload/iebuild/dlbhav/en/dlbhav.htmOctober 15 version of Q243638.exe: IMPORTANT: On October 29, 1999, Microsoft learned that this patch had caused a regression error. While this patch did correct the "IFRAME ExecCommand" vulnerability, it caused an older vulnerability to be re-exposed for Internet Explorer 5 users. The October 15 version of this patch does not include fixes for the issues documented in the following Microsoft Knowledge Base article:
Q242542 Download Behavior Vulnerability in Internet Explorer 5For additional information about these issues, please see the following Microsoft Web site: http://www.microsoft.com/security/bulletins/MS99-012.aspMicrosoft has corrected this regression error and re-released the patch. If you previously applied the fix for this vulnerability, you need to apply the updated fix. November 4 version of Q243638.exe:
After you install this update "Q243638" is added to the Update Versions line when you click About Internet Explorer on the Help menu in Internet Explorer.Microsoft highly recommends that Internet Explorer 5 users evaluate the degree of risk that this vulnerability poses to their computers and determine whether to download and install the patch. Users who are concerned about this vulnerability but cannot install the patch can prevent this behavior from operating by disabling Active Scripting in Internet Explorer 5:
Additional query words:
Keywords : kbenv msiew95 msient msiew98 |
Last Reviewed: November 26, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |