Security company warns of Hotmail worm

Security company warns of Hotmail worm

Security company Finjan Software has warned of a security vulnerability in Microsoft's Hotmail Web-based email service, but Microsoft said that the security hole has already been closed.

The new security flaw, known as a cross-site scripting vulnerability, could be used to create an Internet worm that steals email addresses from Hotmail users' accounts, captures credit card numbers or installs Trojan horse programs, Finjan said. The vulnerability exists in the way that Hotmail treats e-mail containing ActiveX controls, which are small, portable pieces of software code that enable programmers to embed sophisticated user interface elements into Web pages for use over a corporate intranet or the Internet. Hotmail content filters do not adequately block email messages containing the controls, Finjan said.

In cross-site scripting attacks, malicious hackers embed attack code in Web pages or HTML (Hypertext Markup Language) email messages. Once executed, cross-site scripting attacks can give attackers access to personal account or financial information or control over a remote machine.

As a result of the Hotmail vulnerability, attackers could run malicious code on the computer of a Hotmail user who opened an email containing the malicious ActiveX control, Finjan said.

By embedding a worm engine in the email and code that would grab the addresses from the Hotmail user's address books, attackers could use the Hotmail vulnerability to make a worm, Finjan said.

A Microsoft spokesman said the company was informed of the problem by Finjan on September 8 and patched the company's Hotmail systems within 24 hours.

No Hotmail users were affected by the cross-site scripting vulnerability, which no longer affects Hotmail users, he said.

Microsoft has faced frequent criticism for security holes in its Hotmail and .NET Passport single sign-on service, which are used by millions of people on the Internet. In July, for example, the company issued an emergency patch for the .NET Passport service after security researchers discovered and publicised a hole in a feature that helps users update their account password.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.


Brand Post

Show Comments