New IE flaw could hide malicious script behind a JPG
Another flaw in IE has been discovered that could be used to dupe users into downloading scripts.
Finnish security company Secunia describes the flaw – discovered by an outfit called cyber flash – as ‘moderately critical’.
The problem occurs in the way Internet Explorer 6 displays the filename of a image to be downloaded using the ‘Save Picture As’ command. The dialog box that subsequently pops up only shows the URL of the file and the first file extension. So the file that is displayed as being downloaded may appear to be a harmless jpeg, but in fact include script code. And the true nature of, say, a malicious HTML Application (.hta) will be hidden by default on Windows XP system for which the ‘Hide extension for known file types’ setting is enabled by default.
Secunia says the bug has been verified on Windows XP systems that are fully up to date and running Service Pack 2.
Microsoft offers a workaround for the problem on its Knowledge Base.