A security problem originally found in Microsoft\u2019s Internet Explorer 6 browser has returned to haunt IE7, the new version of the browser launched two weeks ago, a security consultant said Monday.Danish security consultancy Secunia posted an advisory regarding an issue whereby an attacker could potentially snare log-ins and passwords from an unsuspecting IE7 user.\u00a0More than\u00a0two years ago, security researchers reported the same fault in IE6. If a user visits a website specially crafted by an attacker, and then opens a "trusted" site such as a bank or e-commerce site that has a pop-up window, the attacker can put new content into the pop-up, said Thomas Kristensen, Secunia\u2019s chief technology officer. This could enable the attacker to ask a user for financial information or passwords, he said.When the problem was revealed in June 2004, Microsoft gave instructions for a workaround for IE6: disable the setting "Navigate sub-frames across different domains." That setting is disabled by default in IE7, but does not appear to prevent the attack, Kristensen said.Microsoft has been notified of the flaw, which was submitted to Secunia by a user, Kristensen said. Microsoft officials did not have an immediate comment on Monday morning.Secunia rated the problem as "moderately critical," but Kristensen said the company was not aware of sites trying to exploit the flaw. Alert users might notice that they\u2019re under attack. Since the URL for the pop-up window is visible, it may be possible to identify a fraudulent request for password information, for example. But "it would require you to pay some attention to the address bar," Kristensen said.However, a clever attacker could also use this problem in combination with a pop-up spoofing weakness identified last week. Microsoft hasn\u2019t patched that problem.Following IE7\u2019s release on Oct. 18, Secunia found a problem it shared with IE6. The vulnerability allowed an attacker to potentially read information from a secure Web site if the user had also opened a maliciously crafted Web site. Microsoft said that the problem is actually in code called by the browsers in another application, Outlook Express, which remains unpatched.By Jeremy Kirk, IDG News Service (London Bureau)Keep checking in at our Security Feed for updated news coverage.