[13740] in bugtraq
Re: Sprint PCS vulnerable to malicious tags
daemon@ATHENA.MIT.EDU (James Seymour)
Mon Feb 7 18:40:17 2000
Message-Id: <20000207124624.BB2182C15B@skynet.medar.com>
Date: Mon, 7 Feb 2000 07:46:24 -0500
Reply-To: James Seymour <jseymour@MEDAR.COM>
From: James Seymour <jseymour@MEDAR.COM>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
> Message-ID: <20000204192231.560.qmail@securityfocus.com>
> Date: Fri, 4 Feb 2000 19:22:31 -0000
> From: Paul Schreiber <shrub@YAHOO.COM>
> Subject: Sprint PCS vulnerable to malicious tags
>
> I'm sure you're all familiar with the CERT advisory:
> http://www.cert.org/advisories/CA-2000-02.html
>
> Sprint PCS's web site is vulnerable to this flaw. ...
[snip]
>
I'm not trying to down-play the significance of this: but I think
we all know that there are likely literally thousands of Web sites
all over the world--perhaps many of them as dependent as SprintPCS
on using Web forms for processing sensitive (customer) data. If
they're all reported here...
Regards,
Jim
--
Jim Seymour | Medar, Inc.
jseymour@medar.com | 24775 Crestview Ct.
Systems & Network Administrator | Farmington Hills, MI. 48335
| FAX: (248)477-8897