[23262] in bugtraq

home help back first fref pref prev next nref lref last post

RE: File extensions spoofable in MSIE download dialog

daemon@ATHENA.MIT.EDU (Jouko Pynnonen)
Mon Nov 26 23:09:19 2001

Date: Mon, 26 Nov 2001 20:51:11 +0200 (EET)
From: Jouko Pynnonen <jouko@solutions.fi>
To: "Jonathan G. Lampe" <jonathan@stdnet.com>
Cc: <bugtraq@securityfocus.com>
In-Reply-To: <5.1.0.14.0.20011126101415.00adccf0@mail.stdnet.com>
Message-ID: <Pine.LNX.4.33.0111262025330.7271-100000@lissu.solutions.fi>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII



On Mon, 26 Nov 2001, Jonathan G. Lampe wrote:

> I could not reproduce this problem with semi-current versions of the latest
> browsers.

[snip]

> I tried the following four variations in my test:  (Comment/uncomment the
> lines!)
> 1. Bogus Content Type, No Attachment Header
> 2. octet Content Type, No Attachment Header
> 3. Bogus Content Type, Attachment Header
> 4. octet Content Type, Attachment Header


Some details needed for reproducing and exploiting the flaw were left
out of my posting because there is no good workaround or a patch
available, and the flaw could be quite easily used maliciously. Using
those details it would be relatively easy to create a worm that infects a
system when a user "opens" a plain text file from an infected website,
for instance. For the same reason there wasn't any test page URL included
in my posting. That, and technical details will be published later.



-- 
Jouko Pynnonen          Online Solutions Ltd       Secure your Linux -
jouko@solutions.fi      http://www.solutions.fi    http://www.secmod.com


home help back first fref pref prev next nref lref last post