SHARE
Facebook X Pinterest WhatsApp

PC Week: Analysis: IE 5.0 flaw makes PCs vulnerable

Written By
thumbnail
Web Webster
Web Webster
Sep 5, 1999

“Some hackers search for security holes in order to exploit
them; others look for them for the sheer intellectual challenge.
The latter is the case with Bulgarian hacker Georgi Guninski, who
has repeatedly exposed dangerous security holes in Microsoft Corp.
products.

Guninski’s latest discovery — a treacherous design flaw in
Internet Explorer 5.0 — is perhaps the most serious ever.
It
allows anyone with a Web page to take over your computer system via
a few simple lines of text within the HTML code that comprises the
page. If you so much as visit the page, your system may be subject
to the exploit.

As if this weren’t bad enough, hostile HTML code can also be
included in an e-mail message. This is possible because many e-mail
programs, including Outlook Express, Outlook, Eudora Lite and
Eudora Pro, invoke IE 5.0 ‘behind the scenes’ to display e-mail
that contains HTML code. So, even if you are not using IE 5.0
for your usual Web browsing, you may be susceptible.

Finally, the exploit can be triggered if you read Internet
newsgroups with IE 5.0 because — as with e-mail — a public
message posted to one of these groups can contain the hostile HTML
code that compromises your system.”

“Since Microsoft has not posted a patch or even an advisory
about the ActiveX scripting hole Guninski discovered, users must
take steps themselves… A partial solution is to run a different
browser, such as Netscape Navigator or Opera. … However, because
IE 5.0 is very tightly ‘wired’ into Windows 98, and may pop up
unexpectedly or be invoked by third-party programs… it is also
important to take measures to disable the ActiveX feature that
causes the vulnerability.”

Complete
Story

Related stories (all from the first week of September,
1999): 
The Age: The end
of e-innocence
(Sep 05, 1999)
PC Week:
Analysis: Microsoft and the consequences of misplaced trust

(Sep 04, 1999)
Wired: MS Denies
Windows ‘Spy Key’
(Sep 03, 1999)
CNN: Crypto
expert: Microsoft products leave door open to NSA
(Sep 03,
1999)
InfoWorld:
Security expert: Windows has back door
(Sep 03, 1999)
Techweb: NSA
Builds Security Access Into Windows
(Sep 03, 1999)
PC World:
Another Security Flaw for Microsoft [Java Virtual Machine]
(Sep
03, 1999)
IDG.net:
Experts: Hotmail hack easy, office fix flawed
(Sep 02,
1999)
Wired: Hits Keep
On Coming Against MS
(Sep 02, 1999)
TheAustralian:
Hacker victims flame Microsoft over Hotmail leak
(Sep 02,
1999)
InfoWorld:
Security bug hits Microsoft Java virtual machine
(Sep 01,
1999)

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.