Skip to main content
  1. Home
  2. Computing
  3. Legacy Archives

Microsoft bails out XP users with unexpected Internet Explorer zero-day flaw patch

Add as a preferred source on Google

In a surprising reversal of policy, Microsoft has decided to issue a patch for Windows XP-based users of their Internet Explorer Web browser, Reuters reports. The flaw was slated to go un-patched for Windows XP, which would have permanently left the versions of Internet Explorer that are compatible with the dated OS vulnerable to the flaw. Microsoft reportedly stated as recently as Wednesday that the bug would be left untreated for XP.

“We decided to fix it, fix it fast, and fix it for all our customers,” Microsoft spokeswoman Adrienne Hall said in a statement.

Recommended Videos

This comes after Windows XP users were warned by the U.S. Department of Homeland Security to stop using Internet Explorer because of the threat posed by the vulnerability. The DHS recommended using alternative Web browsers instead, like Google Chrome, or Mozilla Firefox.

Microsoft described the security hole as “a remote code execution vulnerability” which “could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.” Internet security firm FireEye stated today in an official blog post that hackers were using the flaw to target government, energy, defense, and financial industries. However, attacks on the latter two sectors had already been observed by FireEye.

The zero-day bug threatened Internet Explorer versions 6 through 11, though workarounds have been available for Internet Explorer 10 and Internet Explorer 11. However, those versions of the browser aren’t compatible with Windows XP. The last version of Internet Explorer that was compatible with Windows XP was IE 8, according to Microsoft’s IE system requirements pages. IE 8’s “lifecycle start date” was June 17, 2009.

Microsoft ceased supporting Windows XP on April 8. However, should additional threats like this emerge, it’ll be interesting to see whether Microsoft will take similar steps to protect Windows XP users from such dangers.

 
Konrad Krawczyk
Former Computing Editor
Konrad covers desktops, laptops, tablets, sports tech and subjects in between for Digital Trends. Prior to joining DT, he…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more