In the second hole found in a month, one version of the Microsoft Internet Explorer browser has an unpatched software flaw that could allow rogue code to run on a computer.
Microsoft learned of the flaw in October, discovered by Belgian researcher Peter Van Eeckhoutte, according to an advisory published Wednesday by HP’s Zero Day Initiative (ZDI), a program that rewards security researchers for finding software flaws.
ZDI holds off publicly publishing information on a security flaw for up to six months so a software vendor can patch it. As that period came close to expiring, ZDI said it told Microsoft on May 8 it intended to publish details of the flaw.
Microsoft’s IE 8 browser, released five years ago, still holds a 20 percent share of the desktop browser market, according to statistics for April compiled by Net Applications. Microsoft officials were not immediately available for comment.
To exploit the vulnerability, an attacker would have to lure a potential victim to a website engineered to take advantage of the flaw, ZDI’s advisory said. That could end up accomplished by sending the victim an email or instant message that, if clicked, would lead to the attack. If the attack is successful, the hacker would have the same user rights on the computer as the victim.
ZDI wrote the vulnerability is a “use-after-free” flaw, which involves the handling of CMarkup objects.
Earlier this month, Microsoft issued an emergency patch for a flaw that affected IE 6 through 11. The problem could allow attackers to execute code remotely on a compromised computer if the user views an infected Web page using the browser.