A security researcher claims to have crafted a simpler version of an exploit that could compromise a Microsoft Windows system patched with Service Pack 2.
The researcher posted a proof of concept demonstration which, when an image is moved from one part of a web page to another, is designed to create a file on the user's machine, bypassing the "Local Computer" zone lockdown security feature in SP2. Secunia said on Monday it had confirmed the exploit was effective against SP2-patched systems.
While no patch is available, users can protect themselves by disabling the "Drag and Drop or copy and paste files" option in Internet Explorer, according to Microsoft. Secunia said users could also set the security level for the "Internet" zone to "high" and disable active content.
A few vulnerabilities in SP2 have begun to surface. Earlier this month, Finjan Software claimed to have discovered a set of 10 major security flaws in SP2, bypassing many of the security measures the update puts into place and allowing the execution of malicious code on a system by luring the user to a specially crafted Web page.
However, the service pack has blocked some new attacks that are effective against earlier versions of Windows XP, for example the still-unpatched IFRAME vulnerability that allowed attackers to plant malicious code on PCs via a hacked banner ad server.