| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Exploit code released on the web |
From: Chris It's amazing... Firefox is immune to this exploit. And WHO says MS is secure? geez... /Chris Glenn Meadows wrote: > http://www.theregister.co.uk/2005/01/10/ie_sp2_exploit/ > Exploit code attacks unpatched IE bug > By John Leyden > Published Monday 10th January 2005 12:08 GMT > Code which exploits a vulnerability in the HTML Help control of Internet > Explorer has been released onto the net. Secunia has upgraded the > vulnerability, uncovered in October 2004, to "extremely critical". Even > users who have upgraded to Windows XP SP2 with all available patches are > affected, the security reporting firm warns. > > "The vulnerability can be exploited by malicious people to place and execute > arbitrary programs on a client system if a user visits a malicious website. > It doesn't require user interaction," Thomas Kristensen, CTO, told El Reg. > > "The vulnerability was originally discussed as the Drag'n'Drop vulnerability > back in October 2004. The new development only utilises flaws in the HTML > Help control. Users can only protect themselves by disabling ActiveX support > or using another product." > Secunia has published an online test for the vulnerability here. R > > --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.