[5595] in bugtraq

home help back first fref pref prev next nref lref last post

IE4.0 patch

daemon@ATHENA.MIT.EDU (Richard Trott)
Thu Nov 13 15:16:43 1997

Date: 	Thu, 13 Nov 1997 14:38:30 -0500
Reply-To: Richard Trott <trott@REMUS.RUTGERS.EDU>
From: Richard Trott <trott@REMUS.RUTGERS.EDU>
To: BUGTRAQ@NETSPACE.ORG

Microsoft released a patch for the recently-reported (via l0pht--see
http://l0pht.com/advisories.html if you missed it on bugtraq) buffer
overflow in Win95 with regard to res:// type URLs.

Does anyone know if the patch
(http://www.microsoft.com/ie/security/?/ie/security/buffer.htm to get it)
actually fixes Win95, or if it's just an IE patch?  The l0pht advisory
indicated that other apps were vulnerable because the problem was with
Win95, not IE.  (Easy, if not-so-thorough, way to test:  use Outlook
Express (or Windows Explorer) to view a bogus res:// URL of longer than
256 characters and watch it crash Outlook Express (or Windows Explorer).
Install patch above.  Try again.  Does it still crash?  I don't have a
Win95 machine at my disposal to test this with...)

Richard Trott
trott@remus.rutgers.edu

home help back first fref pref prev next nref lref last post