. Microsoft answered the allegation , stating that the flaw is not crucial to the system. Here is the report taken from eweek.
An independent security researcher has pinpointed a denial-of-service flaw in Microsoft's brand new Internet Explorer 7 Beta 2 Preview just moments after installing the security-centric browser makeover.
Tom Ferris said could hardly believe his eyes when the new browser crashed less than 15 minutes after he started using a homemade fuzz testing tool to poke around for potential security issues.
Ferris, known online as "badpack3t," found that specially crafted HTML could cause IE7 to crash because "urlmon.dll" does not properly parse the "file://" protocol.
"I've confirmed a denial-of-service at this point, but I'm sure someone malicious could research this some more to control memory at some point to cause code execution," Ferris said in an interview with eWEEK.
Here is the answer of Microsoft taken from eWeek.
On the Internet Explorer blog, Microsoft program manager Tony Chor confirmed the bug causes a browser crash but said initial investigations did not find that it was exploitable by default to elevate privilege and run arbitrary code.
"This bug had already been found during our code review and analysis that is a mandatory part of our development process. It was scheduled to be fixed before our next public release. We do not believe this bug is easily exploitable," Chor said.
The Redmond, Wash. software maker typically downplays a denial-of-service browser bug that fixes itself when the browser is restarted, but Ferris said it's dangerous to assume the risk cannot be escalated with additional research.
"We've seen in the past where [malicious hackers] took a denial-of-service issue and created a zero day," he said, citing a case in November 2005 when a U.K.-based group called "Computer Terrorism released a nasty exploit for a bug that was reported simply as a browser crash issue.
Even though the IE7 browser is still in beta, which allows time to fix bugs before the final release, Ferris said something as serious as a potential code execution hole should have been found by Microsoft's software engineers.
"This is Beta 2. The next step is full release," he added. A final release of Internet Explorer 7 for Windows XP is expected sometime during the second half of 2006.
To have a view of the actual code that could crash the IE7 browser and the actual events as the browser crashed visit the Security Protocol Site.
The battle for browser supremacy has been the hottest since the release of Firefox. Microsoft continues to improve its IE Browser as other companies tries to cope up. This will only mean good news to browser freaks like us.