I.E. Caution

pilot_dude

En-Route
Joined
Nov 2, 2010
Messages
2,793
Display Name

Display name:
pilot_dude
For those who use Internet Explorer, I received this message today from our IT dept.:

[FONT=&quot]Below is some information for you regarding the IE issue:[/FONT]
[FONT=&quot]Microsoft has warned of a new security flaw in all versions of its Internet Explorer web browser for Windows PCs. A patch has yet to be.[/FONT]
[FONT=&quot]Vulnerability CVE-2014-1776 to give the problem its formal name, allows access to computers. It's all due to “the way Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated”, the software giant explained on Saturday.[/FONT]
[FONT=&quot]The flaw means the browser “may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer".[/FONT]
[FONT=&quot]"Microsoft is aware of limited, targeted attacks that attempt to exploit [this] vulnerability in Internet Explorer," the software giant added.[/FONT]
[FONT=&quot]"An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.”[/FONT]
[FONT=&quot]Internet Explorer 6 through 11 are all at risk, on all current versions of Windows from Vista to 8 and Windows Server 2003 to 2012 R2. The bug is understood to be present in IE on Windows XP, although that operating system is no longer supported.[/FONT]
[FONT=&quot]Redmond's recommended reaction to the problem is to deploy version 4.1 of The Enhanced Mitigation Experience Toolkit (EMET), as that software “helps mitigate the exploitation of this vulnerability by adding additional protection layers that make the vulnerability harder to exploit.”[/FONT]
[FONT=&quot]The US Homeland Security's Computer Emergency Readiness Team (CERT) has urged "users and administrators enable Microsoft EMET where possible and consider employing an alternative web browser until an official update is available". [/FONT]
[FONT=&quot]Even the European Union Agency for Network and Information Security (ENISA), has weighed in with a recommendation that "Users who want to avoid the abovementioned risk should temporarily use another browser until this security gap has been fixed."[/FONT]
[FONT=&quot]Microsoft suggests a few other workarounds, such as switching on IE's Enhanced Protected Mode or setting security levels to “High” to stop ActiveX controls and Active Scripting working.[/FONT]
 
The government.

Actually, when we were delivering web apps to the intelligence community in the government, they were lock-stock-and-barrel Firefox. Unfortunately Firefox was lagging behind on the technology we were needing (we were trying to get them to IE9 or Chrome).
 
As attroicous as MedXpress is, it seems to work fine with the popular browsers (Firefox, Safari, Chrome)...Here's the FAA's take on it:

For security and compatibility reasons, it is recommended that the latest Internet Explorer version be used. FAA MedXPress requires that JavaScript be enabled on your browser. It is also recommended that the Adobe Reader plug-in, version 5.0 or above, be installed. If you have problems with any of the functionality or display of FAA MedXPress screens, it is recommended that you install Internet Explorer version 8.0 or higher.​

As far as that goes it appears someone at the FAA has been drinking the MIcrosoft Kool-Aid a bit to heavily.
 
Back
Top