With Microsoft saying that it may wait until April 11 to patch a critical vulnerability in its Internet Explorer browser, security vendor eEye Digital Security has released what it calls a “temporary” patch to address the problem.
The bug, which concerns the way IE processes webpages using the createTextRange() method, is now being exploited by attackers on hundreds of malicious websites. Users who might be tricked into visiting these websites could have unauthorized software installed on their computers, security experts warn.
Though Microsoft has described these attacks as “limited” in scope, the problem is being taken seriously by the software giant because the exploits can be used to seize control of a user’s machine.
“We’re working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability,” wrote Stephen Toulouse, head of Microsoft’s Security Response Center, in a Saturday blog posting.
This patch is expected to be released as part of an April 11 security update, although the software could come earlier if the threat grows, Toulouse said.
The possibility that it could be more than two weeks before this bug is fixed prompted eEye to release the patch, said Marc Maiffret, the security company’s chief hacking officer. “That’s a long time to leave several million Windows users without any sort of protection.”
Microsoft says that users can avoid the attack by disabling Active Scripting in their browsers, but this is not a viable option for the many users who use sites that employ scripting, Maiffret said.
EEye’s patch, which is available free of charge, will automatically remove itself when Microsoft’s official patch is delivered.
This not the first time security researchers have rushed to patch IE ahead of Microsoft. In late December, Ilfak Guilfanov, a developer with Liege Belgium’s DataRescue SA, wrote a widely distributed patch that fixed a similarly critical bug in Internet Explorer.
-Robert McMillan, IDG News Service
For related news coverage, read Microsoft Tests Fix for IE Bug as Exploits Appear.
This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in.
Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.