Instead of making the browser more secure, Microsoft\u2019s August Internet Explorer security update introduced a critical security bug, according to researchers at eEye Digital Security.Microsoft released the security patch, known as MS06-042 on Aug. 8, but users soon reported several problems with the software.Patched browsers would crash when using Web-based versions of several applications, including PeopleSoft, Siebel and Sage CRM. Websites that used HTTP 1.1 compression to speed up the downloading of images could also cause the browser to fail.These issues are described here. The MS06-042 update is detailed here.Last week, Microsoft released a "hotfix" download that addressed these problems, but the software giant will also take the unusual step of re-releasing the entire MS06-042 update, thus ensuring that all Windows users would automatically receive the updated code. What Microsoft hasn\u2019t told its users, eEye said Tuesday, is that the browser-crashing bug could also be used by attackers to run unauthorized software on a victim\u2019s PC."What people didn\u2019t know about that patch is when [Microsoft] introduced that patch, they actually introduced a new exploitable vulnerability," said eEye Chief Hacking Officer Marc Maiffret. "They basically butchered that patch."EEye discovered the security problem last week after looking more closely at the crashing problem, but the company believes that the security hole is also known by other security researchers and exploit writers."The bad guys basically know about this and know that it\u2019s an exploitable scenario," Maiffret said.Researchers at eEye have created a "proof-of-concept" exploit for the problem in their labs, but Maiffret did not know of any such code being released to the public. This lessens the likelihood of a widespread attack based on the bug.Nevertheless, eEye is encouraging IT administrators to apply the revised MS06-042 patch as soon as possible.The problems with MS06-042 have rekindled an ongoing debate on the subject of responsible disclosure, with eEye faulting Microsoft for not informing customers sooner of the security flaw, and Microsoft saying that eEye\u2019s disclosure was done "irresponsibly," according to Tony Chor, a group program manager on the Internet Explorer team. Microsoft knows of no attackers exploiting the bug at this time, he said. The company has released a security advisory on the matter, which can be found here.Microsoft had been planning to re-release the MS06-042 update on Tuesday, but that has now been delayed indefinitely as Microsoft fixes an unspecified problem with the patch, Chor said. "Last night, we found an issue that would prevent some customers from being able to deploy the update," he wrote in a Tuesday blog posting. "Unfortunately, we missed this issue, plain and simple."The delay is due to a bug affecting Microsoft\u2019s Systems Management Server (SMS) product, according to a source familiar with the matter. The patch does work with the company\u2019s free update services, such as Windows Update, the source added. "Obviously, not everyone has bought [Microsoft\u2019s] SMS product, and that shouldn\u2019t be a reason to delay patches," the source said.Chor\u2019s blog posting can be found here.-Robert McMillan, IDG News Service (San Francisco Bureau)Related Links:\n\nMicrosoft Fixes Memory Bug in Security Patch\n\nMicrosoft Releases Patches for Vista OSThis article is posted on our Microsoft Informer page.\u00a0For more news on the Redmond, Wash.-based powerhouse, keep checking in.Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.