Workarounds Available for Zero-Day Vulnerability

News of the vulnerability spread last week when Maurycy Prodeus of iSec Security Research posted information about the vulnerability on the Web. According to Microsoft's advisory, the vulnerability is due to the way VBScript interacts with Windows Help files when using Internet Explorer.

To address the issue, Microsoft made a number of suggestions, including restricting access to the Windows Help system. The company warned however that if the Windows Help System is rendered unavailable, users may not be able to leverage the help function in applications. The company also suggested user change the local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting, and avoid pressing the F1 key if they are prompted to by a Web site.

Microsoft served up a handful of workarounds to plug a security hole caused by an unpatched zero-day on March 1st.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

  • Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date