idleprocess said:
Here's (some of) what MSFT has to say about it:
It looks like one can be compromised via a website without having to download anything.
You are downloading and opening files when you visit a website. Your web browser figures out, by the type and context of the files, what it should do with them. If it can't tell, you're given that save as dialog. But just because you don't get that doesn't mean the same underlying process is not happening. It is.
From the BBC:
"Security firms said users can stay safe from this vulnerability by using an alternative browser, such as
Opera or
Firefox 2.0, with Windows. Also protected are those using Windows Vista with Internet Explorer 7.0."
From what I read, IE7 must be in protected mode, too. So, another case of being pretty safe without having to work at it (if you primarily use IE on your home machine...well, switch to something else, ASAP! This isn't the first, and won't be the last time!). It's businesses using whole MS systems, and thus being tied to IE, that are going to be
nailed by this. Even with perimeter security is place, this can get by with a user that's used to IE going to browse the web.