[10622] in bugtraq
Re: Netscape Communicator JavaScript in security
daemon@ATHENA.MIT.EDU (John D. Hardin)
Tue May 25 13:40:52 1999
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.LNX.3.96.990524101743.13038F-100000@gypsy.rubyriver.com>
Date: Mon, 24 May 1999 10:23:06 -0700
Reply-To: "John D. Hardin" <jhardin@WOLFENET.COM>
From: "John D. Hardin" <jhardin@WOLFENET.COM>
X-To: Georgi Guninski <joro@NAT.BG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <374936DD.77EC04C9@nat.bg>
On Mon, 24 May 1999, Georgi Guninski wrote:
> Vulnerabilities:
> * Reading user's cache and accessing information such as passwords,
> credit card numbers.
> * Reading info about the Netscape's configuration ("about:config").
> This includes finding user's email address, mail servers, the
> encoded mail password (it must me saved and may be decoded). This
> allows reading user's email.
>
> The more dangerous part is that this vulnerability MAY BE EXPLOITED
> USING HTML MAIL MESSAGE.
...unless you're sanitizing your email. Anybody using an HTML-enabled
mail client should at least be aware of the availability of this tool:
ftp://ftp.rubyriver.com/pub/jhardin/antispam/procmail-security.html
--
John Hardin KA7OHZ jhardin@wolfenet.com
pgpk -a finger://gonzo.wolfenet.com/jhardin PGP key ID: 0x41EA94F5
PGP key fingerprint: A3 0C 5B C2 EF 0D 2C E5 E9 BF C8 33 A7 A9 CE 76
-----------------------------------------------------------------------
In the Lion
the Mighty Lion
the Zebra sleeps tonight...
Dee de-ee-ee-ee-ee de de de we um umma way!
-----------------------------------------------------------------------
9 days until Crusade: the Babylon Project