1996-08-27 - Re: Microsoft Explorer security hole (fwd)

Header Data

From: ichudov@algebra.com (Igor Chudov @ home)
To: ncognito@gate.net (Ben Holiday)
Message Hash: a1abcc4cb9320025decc6aeee857e7b53293c8b9e516fc010ee1e768de88ff68
Message ID: <199608262206.RAA03891@manifold.algebra.com>
Reply To: <Pine.A32.3.93.960826001930.31882A-100000@seminole.gate.net>
UTC Datetime: 1996-08-27 04:08:30 UTC
Raw Date: Tue, 27 Aug 1996 12:08:30 +0800

Raw message

From: ichudov@algebra.com (Igor Chudov @ home)
Date: Tue, 27 Aug 1996 12:08:30 +0800
To: ncognito@gate.net (Ben Holiday)
Subject: Re: Microsoft Explorer security hole (fwd)
In-Reply-To: <Pine.A32.3.93.960826001930.31882A-100000@seminole.gate.net>
Message-ID: <199608262206.RAA03891@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text


please publish the exploit.

many many thanks in advance

igor

Ben Holiday wrote:
> 
> 
> 
> ---------- Forwarded message ----------
> Date: Mon, 26 Aug 1996 01:35:07 GMT
> Subject: Microsoft Explorer security hole (fwd)
> 
> On Sun, 25 Aug 1996 13:55:30 -0600 (MDT), Carl Nation
> <carl@iserver.com> wrote:
> 
> To our Resellers/Customers,
> 
> Our sysadmin received this security alert, and we thought we should
> pass it along...
> 
> ------- Forwarded Message
> 
> Date: Wed, 21 Aug 1996 13:12:59 -0400
> From: felten@CS.Princeton.EDU (Ed Felten)
> Subject: Internet Explorer Security Problem
> 
> We have discovered a security flaw in the current version (3.0) of
> Microsoft's Internet Explorer browser running under Windows 95.  An
> attacker could exploit the flaw to run any DOS command on the machine of
> an Explorer user who visits the attacker's page.  For example, the
> attacker could read, modify, or delete the victim's files, or insert a
> virus or backdoor entrance into the victim's machine.  We have verified
> our discovery by creating a Web page that deletes a file on the machine of
> any Explorer user who visits the page.
> 
> The core of the attack is a technique for delivering a document to the
> victim's browser while bypassing the security checks that would
> normally be applied to the document.  If the document is, for example, a
> Microsoft Word template, it could contain a macro that executes any DOS
> command.
> 
> Normally, before Explorer downloads a dangerous file like a Word
> document, it displays a dialog box warning that the file might contain a
> virus or other dangerous content, and asking the user whether to abort the
> download or to proceed with the download anyway.  This gives the user a
> chance to avoid the risk of a malicious document.  However, our technique
> allows an attacker to deliver a document without triggering the dialog
> box.
> 
> Microsoft has been notified and they are working on fixing the
> problem. Until a remedy is widely available, we will not disclose further
> details about the flaw.
> 
> For more information, contact Ed Felten at felten@cs.princeton.edu or
> 609-258-5906.
> 
> Dirk Balfanz and Ed Felten
> Dept. of Computer Science, Princeton University
> http://www.cs.princeton.edu/sip/
> 
> ------- End of Forwarded Message
> 
> 
> 
> 



	- Igor.





Thread