[14301] in bugtraq
Re: IE and Outlook 5.x allow executing arbitrary programs using
daemon@ATHENA.MIT.EDU (David LeBlanc)
Thu Mar 16 20:34:27 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Message-Id: <3.0.5.32.20000315091216.03b26ad0@pop.mindspring.com>
Date: Wed, 15 Mar 2000 09:12:16 -0800
Reply-To: David LeBlanc <dleblanc@MINDSPRING.COM>
From: David LeBlanc <dleblanc@MINDSPRING.COM>
X-To: Georgi Guninski <joro@NAT.BG>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <38CE4636.56B37C06@nat.bg>
There's a couple of things that aren't clear here -
>IE and Outlook 5.x allow executing arbitrary programs using .eml files
>Description:
>There is a vulnerability in IE and Outlook 5.x for Win9x/WinNT (probably
>others) which allows executing arbitrary programs using .eml files.
Would this happen to apply to other web browsers, e.g., Netscape?
>Details:
>The problem is creating files in the TEMP directory with known name and
>arbitrary content.
How does the file get there? Do all .eml files create temp files? I
assume another work-around would be to have a user-specific temp directory,
such as Windows 2000 uses.
David LeBlanc
dleblanc@mindspring.com