Microsoft added a few final tweaks to its Internet Explorer 8 beta, resolving security issues in the browser aimed at preventing attackers from executing malicious attacks remotely on Windows.
The fix addressed a security flaw brought to light by security researchers Alexander Sotirov and Mark Dowd during the August BlackHat USA conference in Las Vegas.
Specifically, the error allowed them to bypass the Windows Vista defense-in-depth security layers that combined Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) in attacks targeting the IE browser by using the .Net framework to exploit a memory corruption vulnerability within the iexplore.exe process and subsequently run arbitrary code.
|