From: bf578@scn.org (SCN User)
To: cypherpunks@toad.com
Message Hash: 33fc506ba95d44d9e2865403743699e2881d7aad1c69a00adfb799f28124fa49
Message ID: <199608270144.SAA18367@scn.org>
Reply To: N/A
UTC Datetime: 1996-08-27 09:21:53 UTC
Raw Date: Tue, 27 Aug 1996 17:21:53 +0800
From: bf578@scn.org (SCN User)
Date: Tue, 27 Aug 1996 17:21:53 +0800
To: cypherpunks@toad.com
Subject: Re: Microsoft Explorer security hole (fwd) MSoft's reply...
Message-ID: <199608270144.SAA18367@scn.org>
MIME-Version: 1.0
Content-Type: text/plain
Date: Thu, 22 Aug 1996 15:49:33 -0700
From: Thomas Reardon <thomasre@MICROSOFT.com>
Subject: Re: Internet Explorer security problem (Felten, RISKS-18.36)
>We have discovered a security flaw in the current version (3.0) of
>Microsoft's Internet Explorer browser running under Windows 95. An
>attacker could exploit the flaw to run any DOS command on the machine
>of an Explorer user who visits the attacker's page.
We now post the virus warning dialog on local files (file: urls). We have
always posted it on remote files (http: urls). Note that the root of the
problem is not Java or the browser, but in macro-enabled applications. IE3
has a mechanism to warn users about safety of documents when used with
common macro-enabled applications. We are have updated Microsoft Word such
that by default it will not run macros embedded in documents.
-Thomas
>
>
>
>---------- Forwarded message ----------
>Date: Mon, 26 Aug 1996 01:35:07 GMT
>Subject: Microsoft Explorer security hole (fwd)
>
>On Sun, 25 Aug 1996 13:55:30 -0600 (MDT), Carl Nation
><carl@iserver.com> wrote:
>
>To our Resellers/Customers,
>
>Our sysadmin received this security alert, and we thought we should
>pass it along...
>
>------- Forwarded Message
>
>Date: Wed, 21 Aug 1996 13:12:59 -0400
>From: felten@CS.Princeton.EDU (Ed Felten)
>Subject: Internet Explorer Security Problem
>
>We have discovered a security flaw in the current version (3.0) of
>Microsoft's Internet Explorer browser running under Windows 95. An
>attacker could exploit the flaw to run any DOS command on the machine of
>an Explorer user who visits the attacker's page. For example, the
>attacker could read, modify, or delete the victim's files, or insert a
>virus or backdoor entrance into the victim's machine. We have verified
>our discovery by creating a Web page that deletes a file on the machine of
>any Explorer user who visits the page.
>
>The core of the attack is a technique for delivering a document to the
>victim's browser while bypassing the security checks that would
>normally be applied to the document. If the document is, for example, a
>Microsoft Word template, it could contain a macro that executes any DOS
>command.
>
>Normally, before Explorer downloads a dangerous file like a Word
>document, it displays a dialog box warning that the file might contain a
>virus or other dangerous content, and asking the user whether to abort the
>download or to proceed with the download anyway. This gives the user a
>chance to avoid the risk of a malicious document. However, our technique
>allows an attacker to deliver a document without triggering the dialog
>box.
>
>Microsoft has been notified and they are working on fixing the
>problem. Until a remedy is widely available, we will not disclose further
>details about the flaw.
>
>For more information, contact Ed Felten at felten@cs.princeton.edu or
>609-258-5906.
>
>Dirk Balfanz and Ed Felten
>Dept. of Computer Science, Princeton University
>http://www.cs.princeton.edu/sip/
>
>------- End of Forwarded Message
>
>
>
>
>
--
------------------------------------------
There are no facts, only interpretations.
I always wanted to be somebody,
Return to August 1996
Return to “bf578@scn.org (SCN User)”
1996-08-27 (Tue, 27 Aug 1996 17:21:53 +0800) - Re: Microsoft Explorer security hole (fwd) MSoft’s reply… - bf578@scn.org (SCN User)