CNET también está disponible en español.

Ir a español

Don't show this again

iPhone 12 launch Tom Holland's Nathan Drake Apple Express iPhone 12 and 12 Pro review Remdesivir approval for COVID-19 treatment Stimulus negotiations status update AOC plays Among Us

Microsoft patches IE browser security hole

The software giant issues a patch for a bug in its Web browser that uses files from the company itself to crash computers.

Microsoft today issued a patch for an Internet Explorer bug that uses files from the software maker itself to crash computers.

Because of flaws in Internet Explorer's "Active Setup Download" technology, hackers or malicious Web site operators could potentially crash Internet-connected computers by overwriting files.

Active Setup is a feature of IE designed to speed download times. Rather than transfer an entire collection of files or applications, Active Setup detects which specific files are needed and downloads only those files, according to Microsoft.

The problem highlights a growing security concern, as more PC users download files from sometimes dubious origins, some of which contain viruses or malicious programs that can crash computers. It is fairly rare, however, that files bearing Microsoft's seal of approval are used to crash computers.

Active Setup treats all Microsoft-based files as trusted, which means the browser will automatically download them without asking for permission. A malicious programmer can theoretically access Microsoft-signed files from a Microsoft Web site, where they are freely available, and include these trusted files as part of a download.

From there, the flaw works much as a "denial of service" vulnerability, overwhelming a computer with normally harmless data. The downloading files, which would contain a Microsoft digital signature and thus pass through Active Setup without alerting computer users, could be sent to a specific file path, overwriting existing files and causing a system crash.

"The point of How a denial of service attack worksthe attack would not necessarily be to try to install the update--it would be simply to overwrite some file on the user's disk," according to Microsoft's bug alert, which went out today. "For instance, if the malicious Web site operator overwrote a crucial file on the disk, he could potentially render the machine inoperable."

The bug does not allow malicious users to access information stored on the computer or do anything but crash the system, according to Microsoft.

Microsoft today issued a patch that updates the Active Setup feature to treat Microsoft files like files from all other origins, asking for a computer user's approval before downloading them.