Who should read this bulletin: Customers using Microsoft® Internet Explorer.
Impact of vulnerability: Run code of attacker's choice, if user visited attacker's web site or opened an HTML e-mail from the attacker. Three other vulnerabilities, of lesser severity and exploitable in more restricted circumstances, also are eliminated by the patches.
Recommendation: Customers should apply the patches for IE and Windows Scripting Host below, and apply the Telnet invocation patch only if using Services for Unix 2.0.
Affected Software:
- Microsoft Internet Explorer 5.01
- Microsoft Internet Explorer 5.5
- Microsoft Windows Scripting Host 5.1
- Microsoft Windows Scripting Host 5.5
Patch availability: http://www.microsoft.com/technet/security/bulletin/MS01-015.asp
|