TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Chris
from: Glenn Meadows
date: 2005-01-10 12:36:44
subject: Re: Exploit code released on the web

From: "Glenn Meadows" 

Firefox has it's own issues that are coming to light, it's not a smooth
piece of cake either...see below:

http://www.theregister.co.uk/2005/01/07/mozilla_flaws/

Mozilla and Firefox flaws exposed
By John Leyden
Published Friday 7th January 2005 12:14 GMT Mozilla and Firefox users were
warned of a number of potentially troublesome security vulnerabilities this
week.

The most serious flaw involves a buffer overflow bug in the way Mozilla
processes the NNTP (news) protocol. The bug creates a means for hackers
inject hostile code into vulnerable systems, providing they trick users
into executing maliciously constructed news server links. All versions of
Mozilla prior to 1.7.5 are affected. Firefox users are advised to make sure
they are running version 1.0 to minimise any risk. The flaw was discovered
by Maurycy Prodeus of Polish firm iSEC Security Research.

Next up, Secunia has discovered a flaw that creates a means to spoof the
source displayed in the Firefox's download dialog box. The vulnerability
has been confirmed in Mozilla 1.7.3 for Linux, Mozilla 1.7.5 for Windows,
and Mozilla Firefox 1.0. Other versions may also be affected, Secunia
warns. It advises Firefox users to avoid download links from untrusted
sources pending the availability of patches from the Mozilla project.

Finally, there's a less serious problem affecting Firefox and its email
client Thunderbird. Security researchers have found that temporary files
are stored by the popular packages in a format that makes it possible for
snoops to read the content of downloads and attachments of other users on
the same machine.

An overview of these flaws and suggested workarounds can be found here. R

---------------------------------

The best remedy is not surf the net.....LOL....

--
Glenn M.


"Chris"  wrote in message
news:41e2c9d9$1{at}w3.nls.net...
> It's amazing... Firefox is immune to this exploit.  And
> WHO says MS is secure?  geez...
>
> /Chris
>
>
> Glenn Meadows wrote:
> > http://www.theregister.co.uk/2005/01/10/ie_sp2_exploit/
> > Exploit code attacks unpatched IE bug
> > By John Leyden
> > Published Monday 10th January 2005 12:08 GMT
> > Code which exploits a vulnerability in the HTML Help control of Internet
> > Explorer has been released onto the net. Secunia has upgraded the
> > vulnerability, uncovered in October 2004, to "extremely
critical". Even
> > users who have upgraded to Windows XP SP2 with all available patches are
> > affected, the security reporting firm warns.
> >
> > "The vulnerability can be exploited by malicious people to place and
execute
> > arbitrary programs on a client system if a user visits a malicious
website.
> > It doesn't require user interaction," Thomas Kristensen, CTO, told El
Reg.
> >
> > "The vulnerability was originally discussed as the Drag'n'Drop
vulnerability
> > back in October 2004. The new development only utilises flaws in the
HTML
> > Help control. Users can only protect themselves by disabling ActiveX
support
> > or using another product."
> > Secunia has published an online test for the vulnerability here. R
> >
> >


begin 666
trpix.gif?&rdm=02465694&dlv=704,20373,155651,119921,480011&kid=119921
&chw=9119921-&tcs=&bls3=000000U&bls4=000002155653&uid=1&dmn=.sentinelcorp.com&s
cx=1600&scy=1200&scc=16&jav=1&sta=,,,1,,,,,,,0,0,0,19679,19579,14659,393,501&ii
d=155651&bid=480011
K1TE&.#EA`{at}`"`(#_`,# P ```"'Y! $`````+
`````"``(```("A%$`.P`` `
end

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.