Instead of making the browser more secure, Microsoft's August Internet Explorer security update introduced a critical security bug, according to researchers at eEye Digital Security.
Microsoft released the security patch, known as MS06-042 on August 8, but users soon reported several problems with the software.
Patched browsers would crash when using Web-based versions of several applications, including PeopleSoft, Siebel, and Sage CRM. Web sites that used HTTP (HyperText Transfer Protocol) 1.1 compression to speed up the downloading of images could also cause the browser to fail.
These issues are described at http://support.microsoft.com/?kbid=923762. The MS06-042 update is detailed at http://www.microsoft.com/technet/security/Bulletin/MS06-042.mspx.
Last week, Microsoft released a "hotfix" download that addressed these problems, but on Tuesday the software giant plans to take the unusual step of re-releasing the entire MS06-042 update, thus ensuring that all Windows users would automatically receive the updated code.
What Microsoft hasn't told its users, eEye said Tuesday, is that the browser-crashing bug could also be used by attackers to run unauthorized software on a victim's PC.
"What people didn't know about that patch is when [Microsoft] introduced that patch, they actually introduced a new exploitable vulnerability," said eEye Chief Hacking Officer Marc Maiffret. "They basically butchered that patch."
EEye discovered the security problem last week after looking more closely at the crashing problem, but the company believes that the security hole is also known by other security researchers and exploit writers.
"The bad guys basically know about this and know that it's an exploitable scenario," Maiffret said.
Researchers at eEye have created a "proof of concept" exploit for the problem in their labs, but Maiffret did not know of any such code being released to the public. This lessens the likelihood of a widespread attack based on the bug.
Nevertheless, eEye is encouraging IT administrators to apply the revised MS06-042 patch as soon as possible.
Microsoft executives were not immediately available to comment for this story.