CNET tech sites: Price comparisons | Product reviews | Tech news | Downloads | Site map
Front PageEnterpriseE-BusinessCommunicationsMediaPersonal TechnologyInvestor
Buffer-overflow bug in IE

By Paul Festa
Staff Writer, CNET News.com
August 19, 1998, 1:25 PM PT

Microsoft is urging users of its Internet Explorer browser to download a patch for a newly discovered buffer-overflow security bug.

The bug takes advantage of the way some versions of the IE browser handle long strings of JScript code.

JScript is a Microsoft scripting language similar to the JavaScript language created by Netscape Communications. The scripting languages, which are unrelated to the Java programming language, are used to create things like pop-up windows and forms on Web pages.

The bug patched yesterday resembles another IE buffer overflow problem reported last year.

In both instances, the bug allows a malicious programmer to take advantage of the way the browser reads a long URL, or, in this case, a long string of JScript code. After the maximum number of characters expected on a string is exceeded, the browser crashes, and the remaining characters--potentially comprising malicious code--go into memory, where they may be executed.

In the case of the previous buffer overflow problem, URLs of the type "res://"--which linked to local resources rather than remote Web pages--would max out after 256 characters, letting malicious programmers write from the 257th character.

In the case of the JScript buffer overflow bug, Microsoft is not disclosing the character limit.

"We know, but don't want to let that information out," said Karan Khanna, product manager for Windows NT security.

Khanna stressed that the bug could not manifest itself as a matter of chance, and that a victim would have to visit a site where the code was deliberately entered. He also noted that Microsoft is not alone in battling the buffer overrun menace.

"This happens on many applications and operating systems," he said. "What we're trying to do is to educate developers about safe coding practices, about taking more care in how they handle strings."

Microsoft has recommended that users unable to download the patch disable active scripting in the "Untrusted" and "Internet" zones under Internet Explorer security preferences.

The problem affects IE 4.0 and 4.01 running on Windows 95, 98, and NT 4.0.



E-mail story Print story Send us news tips


 Search
 
   

Latest Headlines
display on desktop
Hot links, cool trends on the Web
Year in review: HP's Compaq conquest
Year in review: Corporate IM
A happy New Year for hacker Mitnick
Broadband about-face
Sun up after Microsoft ruling
Sendo accuses Microsoft of dirty tricks
Optimism buoys China Web portals
Bring on the Web services war
Year in review: Game on
Microsoft ordered to carry Java
Segway scoots off Amazon's shelves
With Google at gates, Yahoo arms itself
Survey: Employees ready to walk
Online shopping passes $11 billion
Yahoo to acquire Inktomi
China pushes homegrown chip
Warming PC sound with vacuum tubes
Perspective: Will this land me in jail?
Microsoft, Adobe in document duel?
This week's headlines

News Tools
Get news by mobile
Listen live to CNET Radio
Display news on desktop

CNET newsletters

News.com Enterprise Hardware (weekly) (sample)

News.com Alert (when major news breaks) (sample)

News.com Daily Dispatch (sample)

News.context (weekly) (sample)

Investor Daily Dispatch (sample)

Week in Review (sample)





All newsletters | FAQ
Manage my newsletters

Send us news tips | Contact Us | Corrections | Privacy Policy

   Featured services: Memory Upgrades | GameSpot Complete | Holiday Gifts | Web Hosting | Digital Photo Guide   
  CNET Networks: Builder.com | CNET | GameSpot | mySimon | TechRepublic | ZDNet About CNET   

Copyright ©1995-2002 CNET Networks, Inc. All rights reserved. CNET Jobs