| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: More fiction, more nonsense |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_005C_01C2C55D.F8230430
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Except for a bug that would be a vulnerability in its own right, not =
unless you persuade the user to take an action against his own interest =
and click on a link to open such a page. It's not like this is =
difficult. Look at all the folks that happily opened EXEs sent as =
attachments after ignoring the warning that it is dangerous to do this.
Rich
"Geo." wrote in message =
news:3e348290$1{at}w3.nls.net...
Hmm.. could you fire up IE to go get the media player file from an =
email
(extending the process ).
Geo.
"Rich" wrote in message news:3e342f8f$1{at}w3.nls.net...
Couldn't be email as you can't play an ASF file with the background =
sound
tags. If you could then there would be an issue. There isn't though.
Rich
"Geo." wrote in message =
news:3e3419e4$1{at}w3.nls.net...
"Rich" wrote in message news:3e335e3e{at}w3.nls.net...
> The process starts with the user opening a web page just as the =
report
you posted claims.
Ok, granted the exploit is described as requiring someone to go to a =
web
page first but since (imo) it's being kicked off by playing a media =
file
it
could just as easily have been an email (using the technique I used =
in
this
group to autoplay midi files). There is no requirement to have the =
user do
anything with IE, it can be done with OE reading email or news as =
well.
I'll reply in a new thread to another piece of your post that I =
would like
to discuss further. I'm going to separate it from this thread in an
attempt
to untie the issue from what we are discussing here.
Geo.
------=_NextPart_000_005C_01C2C55D.F8230430
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Except
for a bug that =
would be a=20
vulnerability in its own right, not unless you persuade the user to take = an=20
action against his own interest and click on a link to open such a =
page. =20
It's not like this is difficult. Look at all the folks that =
happily opened=20
EXEs sent as attachments after ignoring the warning that it is dangerous = to do=20
this.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.