A long ignored security hole in Microsoft's Internet Explorer is proving to be a gold mine for hackers, providing an easy way for them to plant malicious programs on vulnerable machines through hacker websites and instant messaging applications, acoording to security experts.
New attacks using the vulnerability included a worm that spreads through AOL's Instant Messenger (AIM) and a malicious website that silently loads snooping software on victims' machines, independent security expert, Richard Smith, said.
Microsoft did not immediately respond to requests for comment.
The security hole, known as the "Object Data vulnerability", is in software code used by IE to process Hypertext Markup Language (HTML) pages containing an element called the Object Data tag. When properly exploited, the vulnerability enables an attacker to place a malicious computer program on a user's machine. No user actions are required to infect a machine, aside from opening an email message or visiting a Web page rigged by an attacker.
Microsoft issued a software patch, MS03-032, on August 20 that was supposed to fix the problem. However, that patch failed to close the hole on Windows machines running Internet Explorer (IE) versions 5.01, 5.5 and 6.0. (See: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-032.asp.)
On September 8, Microsoft acknowledged problems with the MS03-032 patch and promised to issue a fix as soon as possible. Since that time, no changes have been made to the MS03-032 patch. In the succeeding weeks, hackers moved quickly to take advantage of Redmond's slow response.
Recent exploits of the Object Data vulnerability included a virus that spreads over the AIM network, stealing users' account names and passwords then mailing links to a malicious hacker website to the victim's AIM correspondents (or "buddies"), Smith said.
Although the Web site associated with that threat has been removed, users who received and clicked on an infected instant message could have had their AIM account hijacked, Smith said.
The vulnerability also cropped up in an email message containing HTML code that exploits the vulnerability. When opened, the message installs a file called "surferbar.dll" onto the victim's computer with links to pornographic Web sites, according to security company Secunia of Denmark.
While some of the new attacks are targeting holes in the MS3-032 patch, others may just be targeting users who have not applied the patch at all, Smith said.
Short of issuing an updated patch that closed the hole, Microsoft should at least update its bulletin with a widely known workaround that closes the security hole, Smith said.
That fix, developed by a researcher at eEye Digital Security, required a small change to the Windows configuration that did not appear to affect any Windows features, but would protect users from attack, he said.
In the meantime, hackers would continue to take advantage of the Object Data vulnerability, which was easy to exploit and powerful, he said.
"The sky's the limit of what you can do with [the Object Data vulnerability]. This exploit is going to be used for years," Smith said.