Microsoft has reacted quickly to a new vulnerability in Internet Explorer which could allow remote code execution.
Jerry Bryant, senior security communications manager at Microsoft, said in a blog post yesterday that the issue, which was posted at the end of last week, had no obvious exploits but could pose some problems.
"An issue was posted publicly that could allow an attacker to host a maliciously crafted web page and run arbitrary code if they could convince a user to visit the web page and then get them to press the F1 key in response to a pop-up dialogue box," he said.
"We are not aware of any attacks seeking to exploit this issue at this time, and in the current state of our investigation we have determined that users running Windows 7, Windows Server 2008 R2, Windows Server 2008 and Windows Vista are not affected."
The issue concerns Windows Help files and VBScript, file types designed to invoke automatic actions during normal use.
"While they can be very valuable productivity tools, they can also be used by attackers to try and compromise a system," said Bryant.
Microsoft urged users to ensure that their security software is up to date and that they have a firewall in place.
Microsoft investigating new zero-day exploit
By
Staff Writers
on Mar 2, 2010 12:46PM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Kaseya Dattocon APAC 2024 is Back

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Tech For Good program gives purpose and strong business outcomes
Sponsored Whitepapers
_page-0001.jpg&w=100&c=1&s=0)
F5’s 2025 Report: Unlocking AI Success by Conquering App & API Complexity

Driving Innovation and Sustainability through Hybrid IT and AI Solutions

Easing the burden of Microsoft CSP management
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan