IE glitch gives spoofers powerful tool

A newly-discovered vulnerability in Microsoft's Internet Explorer browser could be a powerful new tool for scammers, allowing them to convincingly mask the real origin of Web pages used to trick targets into revealing sensitive information.

The glitch allows attackers to use a specially crafted uniform resource locator (URL) to display in Internet Explorer's Address field a domain name different from the Web page's actual location, a practice known as "spoofing".

Spoofing is a favourite tactic of spammers hoping to con users out of passwords and other personal details with e-mails pretending to be from banks, e-commerce sites, software vendors and other trusted institutions.

The new security hole was first publicised eatlier this week in a posting to BugTraq, a mailing list for discussion of security vulnerabilities. The post's author set up an illustration of the bug at Denmark-based security services firm, Secunia, issued its own advisory on the loophole, rating it a "moderately critical" threat.

The vulnerability afflicts several versions of Internet Explorer, including a fully patched edition of the software's latest release. Several other popular browsers, including Mozilla and Opera, are not affected and correctly display the actual location of sites taking advantage of the URL hack.

Microsoft said it is investigating reports of the vulnerability.

When that inquiry was complete, the company would take whatever steps it deemed necessary, such as issuing a new patch, a spokesperson said.

Standard PC-protection practices like anti-virus software and firewalls may not help in thwarting exploitation of the new Internet Explorer bug, since it relies on social engineering rather than a technical attack.

Secunia recommended in its advisory that users avoid following links from untrusted sources.

Firewalls with URL-filtering capabilities might also defeat the vulnerability, the firm said.

Microsoft said it had not received any reports of the glitch being actively exploited, and objected to the bug's disclosure on the BugTraq mailing list before it had been notified.

"We continue to encourage the responsible disclosure of vulnerabilities," a spokesperson said. "We believe the commonly accepted practice of reporting vulnerabilities directly to a vendor serves everyone's best interests."

The author of the BugTraq posting detailing the vulnerability did not respond to a request for comment.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Stacy Cowley

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?