From: Eric Murray <ericm@lne.com>
To: nobody@huge.cajones.com
Message Hash: 3fe77c042af4c5036f19938b1b6e7f130c1a236a65265f9c95dbe0e6d4ef31be
Message ID: <199706140108.SAA00039@slack.lne.com>
Reply To: <199706132241.PAA09924@fat.doobie.com>
UTC Datetime: 1997-06-14 01:22:27 UTC
Raw Date: Sat, 14 Jun 1997 09:22:27 +0800
From: Eric Murray <ericm@lne.com>
Date: Sat, 14 Jun 1997 09:22:27 +0800
To: nobody@huge.cajones.com
Subject: Re: Impact of Netscape kernel hole
In-Reply-To: <199706132241.PAA09924@fat.doobie.com>
Message-ID: <199706140108.SAA00039@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain
Huge Cajones Remailer writes:
>
> It'd be nice to have more specifics about the whole situation, but
> regardless - any preliminary threat assessments? Exactly how widely
> exploited do you think this has been?
>
> Tim's post (although refuted by Marc) raises some serious issues since I
> suspect that Joe Public has his secret key sitting in c:\pgp\secring.pgp
Of course that's IDEA-encrypted (or maybe something better in PGP 5) so
the attacker would need a lot of compute power to brute-force the key.
I wouldn't worry too much about someone getting my secring.pgp. However
I would worry about them getting my mail folder, my .rhosts, my
/etc/password, etc.
> Some coherent input on the possible impact of this would be appreciated.
Yes, a description of the exploit would be very helpful. It should
be fairly easy to hack a proxy to search and destroy the Java/Javascript
CaptiveX attacklet as it's being received.
--
Eric Murray ericm@lne.com
Network security and encryption consulting. PGP keyid:E03F65E5
Return to June 1997
Return to “Tim May <tcmay@got.net>”