Instead of making the browser more secure, Microsoft’s August Internet Explorer security update introduced a critical security bug, according to researchers at eEye Digital Security.Microsoft released the security patch, known as MS06-042 on Aug. 8, but users soon reported several problems with the software.Patched browsers would crash when using Web-based versions of several applications, including PeopleSoft, Siebel and Sage CRM. Websites that used HTTP 1.1 compression to speed up the downloading of images could also cause the browser to fail.These issues are described here. The MS06-042 update is detailed here. Last week, Microsoft released a “hotfix” download that addressed these problems, but the software giant will also take the unusual step of re-releasing the entire MS06-042 update, thus ensuring that all Windows users would automatically receive the updated code.What Microsoft hasn’t told its users, eEye said Tuesday, is that the browser-crashing bug could also be used by attackers to run unauthorized software on a victim’s PC. “What people didn’t know about that patch is when [Microsoft] introduced that patch, they actually introduced a new exploitable vulnerability,” said eEye Chief Hacking Officer Marc Maiffret. “They basically butchered that patch.”EEye discovered the security problem last week after looking more closely at the crashing problem, but the company believes that the security hole is also known by other security researchers and exploit writers.“The bad guys basically know about this and know that it’s an exploitable scenario,” Maiffret said.Researchers at eEye have created a “proof-of-concept” exploit for the problem in their labs, but Maiffret did not know of any such code being released to the public. This lessens the likelihood of a widespread attack based on the bug.Nevertheless, eEye is encouraging IT administrators to apply the revised MS06-042 patch as soon as possible.The problems with MS06-042 have rekindled an ongoing debate on the subject of responsible disclosure, with eEye faulting Microsoft for not informing customers sooner of the security flaw, and Microsoft saying that eEye’s disclosure was done “irresponsibly,” according to Tony Chor, a group program manager on the Internet Explorer team. Microsoft knows of no attackers exploiting the bug at this time, he said. The company has released a security advisory on the matter, which can be found here.Microsoft had been planning to re-release the MS06-042 update on Tuesday, but that has now been delayed indefinitely as Microsoft fixes an unspecified problem with the patch, Chor said. “Last night, we found an issue that would prevent some customers from being able to deploy the update,” he wrote in a Tuesday blog posting. “Unfortunately, we missed this issue, plain and simple.”The delay is due to a bug affecting Microsoft’s Systems Management Server (SMS) product, according to a source familiar with the matter. The patch does work with the company’s free update services, such as Windows Update, the source added. “Obviously, not everyone has bought [Microsoft’s] SMS product, and that shouldn’t be a reason to delay patches,” the source said.Chor’s blog posting can be found here. -Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our Security Feed for updated news coverage. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe