{"id":445826,"date":"2010-03-19T03:10:48","date_gmt":"2010-03-19T07:10:48","guid":{"rendered":"http:\/\/davidkirkpatrick.wordpress.com\/?p=7132"},"modified":"2010-03-19T03:10:48","modified_gmt":"2010-03-19T07:10:48","slug":"if-your-browser-is-microsoft%e2%80%99s-internet-explorer-%e2%80%a6","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/445826","title":{"rendered":"If your browser is Microsoft\u2019s Internet Explorer \u2026"},"content":{"rendered":"<p>&#8230; <a href=\"http:\/\/www.us-cert.gov\/current\/#microsoft_releases_security_advisory_to2\" >don&#8217;t hit the F1 key<\/a>.<\/p>\n<p>Just one more reason to <a href=\"http:\/\/www.google.com\/chrome\" >go with Google Chrome<\/a>.<\/p>\n<p>From the first link:<\/p>\n<blockquote>\n<h2>Microsoft Releases Security Advisory to Address VBScript Vulnerability<\/h2>\n<p><em>added March 2, 2010 at 08:36 am<\/em><br \/>\nMicrosoft has released a security advisory to address a vulnerability in VBScript. The advisory indicates that this vulnerability exists in the way that VBScript interacts with Windows Help files when using Internet Explorer. By convincing a user to view a specially crafted HTML document (web page, HTML email, or email attachment) with Internet Explorer and to press the F1 key, an attacker could run arbitrary code with the privileges of the user running the application.<\/p>\n<p>US-CERT encourages users and administrators to do the following to help mitigate the risks:<\/p>\n<ul>\n<li>Review Microsoft Security Advisory\u00a0<a href=\"http:\/\/www.microsoft.com\/technet\/security\/advisory\/981169.mspx\" >981169<\/a>.<\/li>\n<li>Review the Microsoft Security Research &amp; Defense\u00a0<a href=\"http:\/\/blogs.technet.com\/srd\/archive\/2010\/03\/01\/help-keypress-vulnerability-in-vbscript-enabling-remote-code-execution.aspx\" >blog entry<\/a> regarding this issue.<\/li>\n<li>Review US-CERT Vulnerability Note\u00a0<a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/612021\" >VU#612021<\/a>.<\/li>\n<li>Refrain from pressing the F1 key when prompted by a website.<\/li>\n<li>Restrict access to the Windows Help System.<\/li>\n<\/ul>\n<p>US-CERT will provide additional information as it becomes available.<\/p>\n<\/blockquote>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/davidkirkpatrick.wordpress.com\/7132\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/davidkirkpatrick.wordpress.com\/7132\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/godelicious\/davidkirkpatrick.wordpress.com\/7132\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/delicious\/davidkirkpatrick.wordpress.com\/7132\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gostumble\/davidkirkpatrick.wordpress.com\/7132\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/stumble\/davidkirkpatrick.wordpress.com\/7132\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/godigg\/davidkirkpatrick.wordpress.com\/7132\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/digg\/davidkirkpatrick.wordpress.com\/7132\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/goreddit\/davidkirkpatrick.wordpress.com\/7132\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/reddit\/davidkirkpatrick.wordpress.com\/7132\/\" \/><\/a> <img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/stats.wordpress.com\/b.gif?host=davidkirkpatrick.wordpress.com&#038;blog=2464417&#038;post=7132&#038;subd=davidkirkpatrick&#038;ref=&#038;feed=1\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230; don&#8217;t hit the F1 key. Just one more reason to go with Google Chrome. From the first link: Microsoft Releases Security Advisory to Address VBScript Vulnerability added March 2, 2010 at 08:36 am Microsoft has released a security advisory to address a vulnerability in VBScript. The advisory indicates that this vulnerability exists in the [&hellip;]<\/p>\n","protected":false},"author":4050,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-445826","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/445826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/4050"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=445826"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/445826\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=445826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=445826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=445826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}