[14301] in bugtraq

home help back first fref pref prev next nref lref last post

Re: IE and Outlook 5.x allow executing arbitrary programs using

daemon@ATHENA.MIT.EDU (David LeBlanc)
Thu Mar 16 20:34:27 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Message-Id:  <3.0.5.32.20000315091216.03b26ad0@pop.mindspring.com>
Date:         Wed, 15 Mar 2000 09:12:16 -0800
Reply-To: David LeBlanc <dleblanc@MINDSPRING.COM>
From: David LeBlanc <dleblanc@MINDSPRING.COM>
X-To:         Georgi Guninski <joro@NAT.BG>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <38CE4636.56B37C06@nat.bg>

There's a couple of things that aren't clear here -

>IE and Outlook 5.x allow executing arbitrary programs using .eml files

>Description:
>There is a vulnerability in IE and Outlook 5.x for Win9x/WinNT (probably
>others) which allows executing arbitrary programs using .eml files.

Would this happen to apply to other web browsers, e.g., Netscape?

>Details:
>The problem is creating files in the TEMP directory with known name and
>arbitrary content.

How does the file get there?  Do all .eml files create temp files?  I
assume another work-around would be to have a user-specific temp directory,
such as Windows 2000 uses.


David LeBlanc
dleblanc@mindspring.com

home help back first fref pref prev next nref lref last post