[12906] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

IE 4.0 Security Flaw

daemon@ATHENA.MIT.EDU (James Philpott)
Fri Oct 17 15:23:47 1997

From: James Philpott <JamesP@MetaInfo.com>
To: "'nanog@merit.edu'" <nanog@merit.edu>
Date: Fri, 17 Oct 1997 12:00:59 -0700


Imagine.

IE 4.0 Security Flaw
(http://www.zdnet.com/pcmag/news/trends/t971017a.htm)

German experts uncover a browser bug with an effect similar to the
Navigator 
bug exposed last June. 

(10/17/97) -- Last June, the Internet community went into an uproar when
a 
Danish computer consultant discovered a security flaw in the first
release of 
Netscape Navigator 4.0. The bug would let clever intruders get access to
Web 
surfers' local files. 

Now it's Microsoft's turn. 

Yesterday, the German computer magazine C'T reported that Ralf Hueskes,
a 
consultant at a German company called Jabadoo Communications, found a
similar 
security hole in Microsoft Internet Explorer 4.0 when he reviewed the
browser 
for that magazine. 

Using Dynamic HTML, an intruder can hide a 1- by 1-pixel IFRAME with a 
reference to the file he wants to see (the path and the name) in a Web
page or 
a mail message. When the victim reads the page or message, the browser
or 
Outlook Express client loads the referenced file into an invisible
window via a 
small Jscript (or any ActiveScripting) program. An additional hidden
IFRAME 
sends it to the intruder's server. The intruder can't change or delete
the 
file; he can simply read it. Interestingly, the flaw does not seem to
appear in 
Macintosh versions of the browser. 

Because the file needs to load into a browser frame, the bug allows
access only 
to text or HTML files. And since a file's exact location in the file
system may 
not be obvious, the potential for mischief isn't necessarily huge. 

C'T alerted Microsoft Germany of the problem, and officials said
Thursday night 
that Microsoft would post a fix on its site as early as today.
Representatives 
at Microsoft's U.S. headquarters also confirmed to The San Jose Mercury
News 
that the company would make a patch available, and they pointed out that
users 
can protect themselves by disabling Active Scripting (View/Internet 
Options/Security/Custom/Settings/Scripting). Note, however, that
disabling 
scripting will make much Web content inaccessible.--Larry Seltzer and
Don 
Willmott 





home help back first fref pref prev next nref lref last post