| 
          
         | 
        
          
            <<  
             ^ 
              >>
          
          
            
              
                Date: 1999-10-02
                 
                 
                IE 5.0 mit boesem Bug
                
                 
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                 
                
      "Download behaviour" heisst das Feature von IE 5.0 , durch  
welches boesartige Website/besitzer die Maschine und ein  
mit ihr verbundenes Intranet entern können. Patch gibts  
inzwischen [see below]  
post/scrypt: Hat jemand mitgezählt Bug numero wieviel  
dieser ist? 
 
 
 
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-   
Jack McCarthy 
Another security problem has cropped up to plague  
Microsoft's browser software. 
The software giant this week admitted a vulnerability in its  
Internet Explorer 5 that could allow a malicious Web site  
operator to read the files on the computer of a person who  
goes to the site, or on other computers on that user's local  
intranet. 
 
Microsoft posted a warning on its Web site saying it had  
discovered the flaw in an IE 5 feature called "download  
behavior," intended to allow Web page authors to download  
files of client-side script, which is software designed to be run  
by the browser. Such software is designed to allow the Web  
site to only download files that are in its domain, and thus  
prevents the users' files from being accessed.  
 
However, an ill-intentioned Web site operator could bypass  
domain restrictions and use download behavior to gain read  
access to files on the user's machine or local intranet,  
according to the Microsoft Web site. 
 
A malicious Web operator would have to know specific file  
names to read them and could not copy, delete or alter them,  
says Scott Culp, a Microsoft security product manager. Also,  
he says that there have been no reported security breaches.  
 
The problem was reported by Georgi Guninski, a Bulgarian  
programmer who earlier found another Microsoft security flaw,  
Culp says. 
 
Microsoft is advising users to protect themselves by disabling  
the Active Scripting feature in IE 5 by doing the following:  
 
-- In IE, select the Tools, then Internet Options, then click on  
the Security tab. 
 
-- Select the Internet Zone, then click on the "Custom Level"  
button. 
 
-- Under "Scripting," find the entry labeled "Active Scripting" and set it to "Disable." 
 
-- Click OK twice to return to IE. 
 
Microsoft says it will deliver a patch for a safe, new version of  
Download Behavior, which will be available at  
http://www.microsoft.com/security/. 
 
Frequently asked questions about the problem can be found  
at http://www.microsoft.com/security/bulletins/ms99-
                   
040faq.asp. 
 
Numerous security flaws have hit Microsoft in recent months.  
Last week, the company released a patch for IE that  
eliminated the "ImportExportFavorites" vulnerability, a hole  
that allowed a Web site operator to carry out any function  
that visitors to a Web site could do on their own computers.  
 
In Redmond, Wash., Microsoft can be reached at 425-882- 
8080,or at http://www.microsoft.com/. 
 
Source 
http://www.idg.net/go.cgi?id=166524
                   
-.-  -.-. --.-   
BIG BROTHER AWARDS AUSTRIA 1999 
Fuer Lauschangreifer, Spitzelfirmen, Datenhaendler,  
gestzlich ermaechtigte Ueberwacher 
Reichen Sie Ihre Nominierung ein: 
http://www.bigbrother.awards.at
                   
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
    
                 
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
edited by  
published on: 1999-10-02 
comments to office@quintessenz.at
                   
                  
                    subscribe Newsletter
                  
                   
                
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
                  <<  
                   ^ 
                    >> 
                
                
               | 
             
           
         | 
         | 
        
          
         |