[13901] in bugtraq

home help back first fref pref prev next nref lref last post

Re: 'cross site scripting' CERT advisory and MS

daemon@ATHENA.MIT.EDU (flynngn@JMU.EDU)
Thu Feb 17 23:40:12 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <38ABE161.BCBBB7D1@jmu.edu>
Date:         Thu, 17 Feb 2000 06:54:09 -0500
Reply-To: flynngn@JMU.EDU
From: flynngn@JMU.EDU
X-To:         David LeBlanc <dleblanc@MINDSPRING.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

David LeBlanc wrote:
>
> What I recommend specifically for using Outlook (probably also applies to
> other mail readers using IE as a HTML viewer) is:
> 1) Set it to run in the Restricted Sites zone
> 2) Edit the Restricted Sites zone into what I call maximum paranoia mode -
> turn EVERYTHING off.  IIRC, cookies are off to begin with, but this gets
> them turned off for sure.

Wouldn't it be better to set the Internet zone for high security and
then set the browser to use the Internet zone? The restricted zone requires
entering the list of untrusted systems while the Internet zone says
"everything that is not in the trusted zone gets the default security
settings".

Here is what I've been recommending:
http://www.jmu.edu/info-security/engineering/issues/apps/outlook.htm

Gary Flynn

home help back first fref pref prev next nref lref last post