Internet Explorer 'zero-day security error

Internet Explorer 's dangerous security chorus continues as Sunbelt Software has just announced a security bug that is not yet universally available and is fully exploitable for the updated version of Internet Explorer 6.0.

This is probably bad news for users because Sunbelt announced that they tested the exploit on an updated version of Internet Explorer with the latest patches and the browser was still exploited from this error. Therefore, Sunbelt has included this error in an unknown form and sent information to Microsoft.

Picture 1 of Internet Explorer 'zero-day security error This security error may affect the system, buffer overflow and 'injection' into shellcode, affecting Internet Explorer 6.0 in Windows XP SP2.

Currently, Microsoft does not have any official documents or notices about this, and there is no information about the error affecting Internet Explorer version 7. The best method now is the user using IE 6 Javascript support should be turned off by going to Tools - Internet Options to tweak.

Another error for IE 6 is when users browse web pages with optional popup objects (redesigned webmaster popup) will be closed and generate errors in Mshtml.dll file This is the error after You install security update 918899 on Windows XP SP2 or Windows Server 2003 SP1. The fast patch has been released by Microsoft for Windows XP SP2, Windows Server 2003 SP1, Windows Server 2003 SP1 x64 Edition, Windows Server 2003 SP1 64-bit Itanium Edition.

In the past week, browsers have been 'knocked out' by security errors in turn. Mozilla also released FireFox 1.5.0.7 to patch a series of security flaws in the previous version, while Internet Explorer continued to be exploited from dozens of bugs. The best way to protect against these threats is from users themselves, be wary of accessing strange websites, turning off ActiveX, Javascript and always updating the latest version to your browser.

BEAUTIFUL