WEBINAR: Live Event Date: September 20, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Designing a Proactive Approach to Information Security with Cyber Threat Hunting REGISTER >
The release of two third-party patches to fix serious security holes in the Internet Explorer browser is a "side-effect of Microsoft not being able to protect its users," according to Marc Maiffret, an executive of one of the companies releasing free security software this week.
EEye says its free patch has been downloaded more than 63,000 times since becoming available Monday. The software addresses what Maiffret, the firm's co-founder, in a statement called a "critical vulnerability that needs to be addressed immediately."
Maiffret said since the vulnerability became public last week, hundreds of Web sites have included code that exploits the hole in how IE processes the "createTextRange()" tag.
The patches come just months after the last third-party fix for a Microsoft flaw was adopted.
January, Russian software developer Ilfak Guilfanov offered a patch to solve a hole in Windows Metafile (WMF). The third-party solution was adopted by SANS and security firm F-Secure. At one point, the crush of people attempting to download the patch crashed the software developer's Web site.
Microsoft, for its part, Tuesday updated its security advisory, noting it has "confirmed new public reports of a vulnerability" in IE.
The software giant said a cumulative patch is on schedule for April, "or sooner as warranted."
"If it were up to Microsoft, you would be vulnerable for 16 days," Maiffret said. Microsoft's patching schedule "is not timely enough."
The eEye and Determina patches are meant as temporary fixes and are designed to stop working once Microsoft's official patch is released.