Goofy
Moderator
Today we released Security Advisory 2501696 to alert customers to a publicly disclosed vulnerability in the MHTML protocol handler. This vulnerability could allow attackers to construct malicious links pointing to HTML documents that, when clicked, would render the targeted document and reflected script in the security context of the user and target location. The end result of this type of vulnerability is script encoded within the link executed in the context of the target document or target web site.
How could I know if my machine is affected?
By default, the MHTML protocol handler is vulnerable on Windows XP and all later supported Windows versions. Internet Explorer is an attack vector, but because this is a Windows vulnerability, the version of IE is not relevant....
riguarda tutte le versioni di Windows: XP, Vista, Windows 7, Windows Server 2003 e Windows Server 2008. L’exploit riguarda un bug MHTML che interpreta le richieste MIME in modo tale da consentire a eventuali malintenzionati di prendere il controllo del PC.
c'è un fix a disposizione mentre si aspetta la patch