Considering recent MHTML exploits that have surfaced for Internet Explorer, would you recommend disabling MHTML...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
within IE? Could doing so have other deleterious effects on security or browser functionality?
The MHTML exploit is similar to past exploits in the Windows Graphics Rendering Engine and is the most recent in a long line of exploits for Internet Explorer involving MHTML, including a vulnerability in MHTML from 2006. The current MHTML exploit allows an attacker to access data on the system or to install malicious code; it could be included in a browser exploit pack or with other malware.
Microsoft describes the vulnerability on its Security Research and Defense blog where Microsoft states that Windows XP and newer are vulnerable.
Before disabling MHTML IE, evaluate your organization's risk tolerance and security needs. However, except for organizations with high-security environments where IE is in use, it's probably best to wait for a patch from Microsoft, since at this point, there is no mass worm or virus that exploits the MHTML security vulnerability.
Of note: There is a Microsoft FixIt available that locks down the MHTML protocol that is similar to the way other protocol handlers have been locked down. The FixIt will mitigate this specific issue and can be used if your organization is under attack as a result of this vulnerability; the FixIt should have minimal impact on functionality. Once a patch is released, however, you may need to re-evaluate whether the FixIt should be removed and the systems restored to the previous settings.
Dig Deeper on Web Browser Security
Related Q&A from Nick Lewis
IP devices like multifunction printers and faxes may be an attack vector. Expert Nick Lewis explains the vulnerabilities, and how to secure them ...continue reading
AceDeceiver is a Trojan that can install itself on iOS devices without any certificates. Expert Nick Lewis explains how it works, and how enterprises...continue reading
USB Thief, a new type of stealth malware, leaves no trace on air-gapped targets. Expert Nick Lewis explains how the malware works and how enterprises...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.