Microsoft confirmed this week another zero day security flaw had hit Internet Explorer (IE), affecting all versions of the browser.
In a security advisory released late yesterday, the software giant confirmed a remote code execution vulnerability which was a result of an invalid flag reference in IE.
The issue had already been taken advantage of, as Microsoft admitted to being “aware of targeted attacks.” However, the company has yet to confirm a fix for the problem.
“We will continue to monitor the threat environment and update this advisory if this situation changes,” the advisory said.
“On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.”
The usual advice has been given to customers of ensuring your security software is up to date and to upgrade to the latest version of the browser, IE8.
This article originally appeared at itpro.co.uk
Copyright © ITPro, Dennis Publishing
Issue: 338 | May 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.