Two new vulnerabilities in Internet Explorer 6.0 were unveiled by a security firm this week that hackers could exploit to bypass security features even in Microsoft's most secure OS, Windows XP SP2.
According to Danish security company Secunia, the "highly critical" vulnerabilities stem from a flaw in IE's drag-and-drop feature and in the browser's security zone.
Hackers could exploit these bugs by enticing users to malicious websites, where specially crafted files -- including image and help files -- could compromise the PC, leaving it open to attack or hijack.
Both bugs can be exploited to circumvent Windows XP SP2's Local Computer zone lockdown security feature, said Secunia.
"This has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2," wrote Secunia in its online alert.
As is its usual practice when it touts critical problems in IE, Secunia recommended that users either disable Active Scripting in the browser, or switch to an alternate, such as Mozilla's Firefox.
Issue: 315 | May 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.