Re: Hotmail security hole - injecting JavaScript using
daemon@ATHENA.MIT.EDU (ck@RIB.DE)
Fri Jan 7 14:08:57 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: <C125685F.003668BD.00@notes-stgt.rib.de>
Date: Fri, 7 Jan 2000 10:58:58 +0100
Reply-To: ck@RIB.DE
From: ck@RIB.DE
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
On Wed, 5 Jan 2000 11:37:49 +0100, Henri Torgemane wrote:
>> What could be useful would be a tag working like
>> <blockscript key=randompieceofdata>
>>
>> </blockscript key=samepieceofdata>
This would just try to fix one of the symptoms. Something more
fundamentally
is wrong: Data and executable code do not belong together. Violation of
this brought us macro viruses, HTML e-mail that steals passwords, trojans,
etc.
Carsten Kuckuk (only speaking for himself)