TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo.
date: 2003-01-25 00:30:34
subject: Re: More fiction, more nonsense

From: "Geo." 

"Rich"  wrote in message news:3e3219d5$1{at}w3.nls.net...
>>   Assuming we are back to the original report you mentioned and we had
been discussing, the problem is that IE allowed a remote site to navigate
to the local file and a distinct IE problem with MIME content tyoes. 
That's it.  This report is just one complex scenario that exploited the IE
issues and it is just those and not the whole scenario that is the
problem.<<

But there is a point here you seem to be missing. Many exploits for IE are
not considered true exploits or not critical exploits because they require
the hacker somehow lure the IE user to the hackers hostile web page in
order to hack the IE user.

If IE were more under the control of the user, if it required a user
specifically make the decision to start up IE and go off to a URL instead
of all these automatic ways of having other apps launch IE on a mission, IE
would be a LOT less of a risk.

I will accept that media player is not the gun, but it is most certainly
aiming the gun and it is also the trigger and it's being pulled by a
stealth feature in a media player file that is under the control of someone
other than the user. No?

Geo.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.