[Dshield] An unfixed highly critical vulnerability discoveredinMicrosoft Internet Explorer
clewis at iquest.net
Thu Apr 8 21:01:02 GMT 2004
Here is something I got on another list I'm on after posting a warning about
this (and giving credit to the Dshield list):
" Yet another IE flaw to block w/eSafe.
And another unpatched flaw:
YaHoo and MSN have took steps against it, but
nothing stops me from using it in html email or
on one of my sites.
Do some searching and you can find many known and
unfixed flaws in IE. Many are there by design and
are not bugs!
Fool me once, shame on you. Fool me twice, shame on me.
Why anyone still uses Internet Explorer for generic
web browsing is beyond me.
Select it's Icon, right click on it, click properties
and then advanced. Run it under different creditials.
Create a generic user on your computer. Give it access
to just about nothing (except the install dir and a few
other needed items) and you have a much safer web surfing environment.
Virtually free of Viruses, worms, and spyware."
But I also understand the statements about NOT dumping IE. We were Netscape
for as long as I could hold out. But that "when's the new release going to
come out" nightmare of a few years ago, coupled with key vendor sites not
working with Netscape turned out to be the "nails in the coffen".
From: list-bounces at lists.dshield.org [mailto:list-bounces at lists.dshield.org]
On Behalf Of Laura Vance
Sent: Thursday, April 08, 2004 2:25 PM
To: General DShield Discussion List
Subject: Re: [Dshield] An unfixed highly critical vulnerability
discoveredinMicrosoft Internet Explorer
After reading the sites that reported it, it seems like there is really
nothing to stop it, because it's using a "feature" of MSIE and
MSOutlook. It's supposed to be able to allow sites to pop up help
windows that completely mimic the OS's help system so the user doesn't
get all confused by different styles of help. As long as web sites are
allowed to store help files on the local machine, there is no safety
net. Unless they add security that doesn't allow web sites to put files
on the local machine in a trusted location. The description said that
they didn't even have to store the help file on the local machine, all
they had to do is provide a bogus help file name then an alternate help
file from a web server somewhere, and when the bogus one failed, the
Internet one is followed with local machine privilages executing
whatever mailicious script is in it.
More information about the list