Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Information Disclosure Vulnerability in Internet Explorer - SANS Internet Storm Center SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms:

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Information Disclosure Vulnerability in Internet Explorer

Microsoft just publish KB Article 980088 [1] in response to the recently announced vulnerability in Internet Explorer. Microsoft confirms that it is possible for a malicious website to read files from the clients computer. All versions of Windows and Internet Explorer appear to be affected.

There is currently no patch for this problem. Microsoft advices users to set the Internet and Local Intranet security zone settings to "High". This will cause a prompt before running ActiveX Controlls and active scripting.

The attacker needs to know the file name. However, a typical target for this vulnerability would be a configuration file which is typically located at a predictable location.


Johannes B. Ullrich, Ph.D.
SANS Technology Institute

I will be teaching next: Application Security: Securing Web Apps, APIs, and Microservices - SANS Cyber Defence Japan August 2022


4514 Posts
ISC Handler
Feb 3rd 2010
"All versions of Windows and Internet Explorer appear to be infected."

You might want to change that to "affected"...

17 Posts
No, "infected" sounds better.
6 Posts
Come on...vulnerable, not infected. What are you going to tell your end users, other than use a different browser?

4 Posts
Thanks Eb, changed the diary.

392 Posts
ISC Handler
does anyone have snort signature for this ?
1 Posts
I snorted when I read "All versions of Windows and Internet Explorer appear to be infected." but I'm guessing that's not what you're looking for. :)
12 Posts
If you want the real info on this vulnerability go here:
It will actually give you some idea of what you are dealing with.

5 Posts
The IE exploit will probably be delivered through heavily obfuscated javascript, so I imagine a Snort signature would be very difficult to write. HIPS/Endpoint protection products are probably better equiped to detect and block it.

29 Posts

Sign Up for Free or Log In to start participating in the conversation!