|Home » Industry Watch
IE Se7en 7W0 (2)
IE Se7en 7W0 has encountered a problem and needs to close.
- IE Se7en 7W0
It's their latest mistake.
- Sheryl Crowe
You people have to stop prosecuting us all the time. We have to be free to innovate.
- Steve Ballmer
Redmond, WA (Rixstep) -- Twenty four hours is all it takes to poke enough holes in Microsoft's latest engineering disaster IE Se7en 7W0 to make it look like Swiss cheese.
The first thought many had was why didn't Microsoft, who have the IE Se7en 7W0 code, wait those twenty four hours before inflicting another disaster on their all too loyal fans. But then those outsiders don't really grasp Redmond's unique development style.
McAfee security software breaks, preventing use of IE Se7en 7W0 as well, proving once again Microsoft change system specs faster than Paris Hilton changes fiancés.
'The McAfee issue is known and we'll work on this for a future build', say representatives for the worst software house ever.
In addition, hangs and crashes abound when actually using the browser. But that's only the tip of the iceberg, for a vulnerability has already been found too.
'So I saw that Microsoft released IE Se7en 7W0 to the public today. So, I figured I would give it a quick look - and I just happened to find something within the first 15 minutes into testing. Weird huh?' writes security researcher Tom Ferris, who continues with the same gleeful sarcasm:
'So you are probably thinking, why release an advisory on a beta product? Well, why not? It's Microsoft - right?'
The vulnerability exists in Microsoft's new version of urlmon.dll and creates a denial of service - and it's eminently easy to accomplish, caused by a programming error that gets people tossed out of Comp Sci 101.
If you want to see a demonstration of this issue without having to actually run that horrible program, click here.