MS Warns of IE/XP Server Exploit

A speaker at the recent Blackhat DC security conference, Jorge Luis Alvarez Medina of Core Security Technologies, demonstrated a previously undocumented method of remotely turning a Windows XP-based computer into a web server — thus exposing the hacked computer's file system to the public. As surprising to the audience as the apparent ease with which this attack was performed, was the news that instead of being a patchable exploit, the attack may actually be enabled by a design feature of the Internet Explorer browser software.

For its part, Microsoft issued Security Advisory 980088, entitled "Vulnerability in Internet Explorer Could Allow Information Disclosure," which detailed the problem and its recommended remedies:

"Microsoft is investigating a publicly reported vulnerability in Internet Explorer for customers running Windows XP or who have disabled Internet Explorer Protected Mode," the report reads. "Our investigation so far has shown that if a user is using a version of Internet Explorer that is not running in Protected Mode an attacker may be able to access files with an already known filename and location."

"In a web-based attack scenario, an attacker could host a website that contains a web page that is used to exploit this vulnerability," the report states. "In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability."

"In all cases, however, an attacker would have no way to force users to visit these websites," the report continued. "Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website."

The advisory warns that an attacker who successfully exploited this vulnerability could gain the same user rights as the local user; and that while users whose accounts are configured to have fewer rights on the system could be less affected than those operating with administrative user rights, many systems remain vulnerable.

"The vulnerability exists due to content being forced to render incorrectly from local files in such a way that information can be exposed to malicious websites," the report said. "At this time, we are unaware of any attacks attempting to use this vulnerability. We will continue to monitor the threat environment and update this advisory if this situation changes."

According to the company, affected versions include Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, and Windows Server 2003 Service Pack 2. Other, older versions of the Internet Explorer software are also vulnerable.

Microsoft says that running Internet Explorer in Protected Mode prevents exploitation of this vulnerability. This is the default setting for Internet Explorer on Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008.

The company also plans to take the appropriate action to protect its customers, which may include providing a solution through its monthly security update release process, or an out-of-cycle security update, depending on customer needs.

"We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers," a company spokesperson stated. "In addition, we are actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability."

As for standard security precautions, Microsoft advises customers to enable a firewall, apply all software updates and install antivirus and antispyware software.

Related:  

Copyright © 2026 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Inside the OCC's Debanking Review and Its Impact on the Adult Industry

For years, adult performers, creators, producers and adjacent businesses have routinely had their access to basic financial services curtailed — not because they are inherently higher-risk customers, but because a whole category of lawful work has long been treated as unacceptable.

Corey Silverstein ·
opinion

How to Build Operational Resilience Into Your Payment Ecosystem

Over the past year, we’ve watched adult merchants weather a variety of disruptions and speedbumps. Some even lost entire revenue streams overnight — simply because they relied too heavily on a single cloud provider that suffered an outage, lacked sufficient redundancy and failover, or otherwise fell short when it came to making sure their business was protected in case of unwelcome surprises.

Cathy Beardsley ·
opinion

Building a Stronger Strategy Against Card-Testing Bots

It’s a scenario every high-risk merchant dreads. You wake up one morning, check your dashboard and see a massive spike in transaction volume. For a fleeting moment, you’re excited at the premise that something went viral — but then reality sets in. You find thousands of transactions, all for $0.50 and all declined.

Jonathan Corona ·
opinion

A Creator's Guide to Starting the Year With Strong Financial Habits

Every January brings that familiar rush of new ideas and big goals. Creators feel ready to overhaul their content, commit to new posting schedules and jump on fresh opportunities.

Megan Stokes ·
opinion

Pornnhub's Jade Talks Trust and Community

If you’ve ever interacted with Jade at Pornhub, you already know one thing to be true: Whether you’re coordinating an event, confirming deliverables or simply trying to get an answer quickly, things move more smoothly when she’s involved. Emails get answered. Details are confirmed. Deadlines don’t drift. And through it all, her tone remains warm, friendly and grounded.

Women In Adult ·
opinion

Outlook 2026: Industry Execs Weigh In on Strategy, Monetization and Risk

The adult industry enters 2026 at a moment of concentrated change. Over the past year, the sector’s evolution has accelerated. Creators have become full-scale businesses, managing branding, compliance, distribution and community under intensifying competition. Studios and platforms are refining production and business models in response to pressures ranging from regulatory mandates to shifting consumer preferences.

Jackie Backman ·
opinion

How Platforms Can Tap AI to Moderate Content at Scale

Every day, billions of posts, images and videos are uploaded to platforms like Facebook, Instagram, TikTok and X. As social media has grown, so has the amount of content that must be reviewed — including hate speech, misinformation, deepfakes, violent material and coordinated manipulation campaigns.

Christoph Hermes ·
opinion

What DSA and GDPR Enforcement Means for Adult Platforms

Adult platforms have never been more visible to regulators than they are right now. For years, the industry operated in a gray zone: enormous traffic, massive data volume and minimal oversight. Those days are over.

Corey D. Silverstein ·
opinion

Making the Case for Network Tokens in Recurring Billing

A declined transaction isn’t just a technical error; it’s lost revenue you fought hard to earn. But here’s some good news for adult merchants: The same technology that helps the world’s largest subscription services smoothly process millions of monthly subscriptions is now available to you as well.

Jonathan Corona ·
opinion

Navigating Age Verification Laws Without Disrupting Revenue

With age verification laws now firmly in place across multiple markets, merchants are asking practical questions: How is this affecting traffic? What happens during onboarding? Which approaches are proving workable in real payment flows?

Cathy Beardsley ·
Show More