1995-09-22 - Re: YET ANOTHER BAD NETSCAPE HOLE!

Header Data

From: heesen@zpr.uni-koeln.de (Rainer Heesen)
To: cypherpunks@toad.com (Cypherpunks Mailing List)
Message Hash: 22176ca1ffc4cebcf7917494baba0eb2ac0184be25053059a06749b4dac6278c
Message ID: <9509221146.ZM25754@Sysiphos.MI.Uni-Koeln.DE>
Reply To: <9509220850.AA07248@cs.umass.edu>
UTC Datetime: 1995-09-22 09:46:54 UTC
Raw Date: Fri, 22 Sep 95 02:46:54 PDT

Raw message

From: heesen@zpr.uni-koeln.de (Rainer Heesen)
Date: Fri, 22 Sep 95 02:46:54 PDT
To: cypherpunks@toad.com (Cypherpunks Mailing List)
Subject: Re: YET ANOTHER BAD NETSCAPE HOLE!
In-Reply-To: <9509220850.AA07248@cs.umass.edu>
Message-ID: <9509221146.ZM25754@Sysiphos.MI.Uni-Koeln.DE>
MIME-Version: 1.0
Content-Type: text/plain


On Sep 22,  4:50am, Futplex wrote:
> Subject: Re: YET ANOTHER BAD NETSCAPE HOLE!
> Ray Cromwell writes:
> > WOW!! Unbelievable! Stop the presses! I Can't believe no one ever
discovered
> > this before! Try a page with the following URL
> >
> >  test 
> >
> > Muahaha! Yet another security hole! Clicking on this mailto brings up
> > an xterm on my machine!
>
> This is curious, because Netscape 1.1N doesn't do this on my setup, unless I
> misunderstand your description somehow. The full string including the pipe
> and all come up in the To: field of the standard Netscape mailer window. At
> that stage I see it as much less of a potential risk. I can't test what
> happens if you actually try to send mail to such a trojan horse URL, because
> there's some screwy configuration here that makes Netscape complain about
> not being able to connect to localhost (!?!) when I try to send mail from it.
>
> Mosaic 2.4 gives a standard warning page in response to this.
>
> (I'm using SunOS 4.1.2)
>
> -Futplex <futplex@pseudonym.com>
>-- End of excerpt from Futplex

This is not curious. Ray uses a very old sendmail version. It's not a Netscape
bug, it's rather a sendmail bug.

Cheers

  Rainer






Thread