TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: Rich
date: 2004-08-20 08:21:32
subject: Re: XPSP2 is barely out, and first exploit claimed again

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0C80_01C4868E.B3595270
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   This requires the user to explicitly drag and drop a broken image to =
somewhere.  Once you start with scenarios which require the user to do =
stuff like this you can imagine all sorts of things.  That the image is =
broken makes it worse.

Rich

  "Glenn Meadows"  wrote in message =
news:41260c9c{at}w3.nls.net...
  May not be new, but just discovered/posted.

  http://www.theregister.co.uk/2004/08/20/sp2_scripting_vuln/

  --=20
  Glenn M.



------=_NextPart_000_0C80_01C4868E.B3595270
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   This
requires the user to =
explicitly=20
drag and drop a broken image to somewhere.  Once you start with =
scenarios=20
which require the user to do stuff like this you can imagine all sorts = of=20
things.  That the image is broken makes it worse.
 
Rich
 

  "Glenn Meadows" <gmeadow{at}comcast.net>">mailto:gmeadow{at}comcast.net">gmeadow{at}comcast.net>
wrote =
in message=20
  news:41260c9c{at}w3.nls.net...Ma=
y=20
  not be new, but just discovered/posted.http=">http://www.theregister.co.uk/2004/08/20/sp2_scripting_vuln/">http=
://www.theregister.co.uk/2004/08/20/sp2_scripting_vuln/--=20
  Glenn
M.

------=_NextPart_000_0C80_01C4868E.B3595270--

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 396/45 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.