TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: Chris
date: 2005-01-10 10:30:48
subject: Re: Exploit code released on the web

From: Chris 

It's amazing... Firefox is immune to this exploit. 
And WHO says MS is secure?  geez...

/Chris


Glenn Meadows wrote:
> http://www.theregister.co.uk/2005/01/10/ie_sp2_exploit/
> Exploit code attacks unpatched IE bug
> By John Leyden
> Published Monday 10th January 2005 12:08 GMT
> Code which exploits a vulnerability in the HTML Help control of Internet
> Explorer has been released onto the net. Secunia has upgraded the
> vulnerability, uncovered in October 2004, to "extremely
critical". Even
> users who have upgraded to Windows XP SP2 with all available patches are
> affected, the security reporting firm warns.
>
> "The vulnerability can be exploited by malicious people to place
and execute
> arbitrary programs on a client system if a user visits a malicious website.
> It doesn't require user interaction," Thomas Kristensen, CTO, told El Reg.
>
> "The vulnerability was originally discussed as the Drag'n'Drop
vulnerability
> back in October 2004. The new development only utilises flaws in the HTML
> Help control. Users can only protect themselves by disabling ActiveX support
> or using another product."
> Secunia has published an online test for the vulnerability here. R
>
>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.