--- Eric <[EMAIL PROTECTED]> wrote:
> Theregister was running the script locally - in the
> myComputer zone.  If 
> you host the malicious html on a webpage, etc. then
> the patch does indeed 
> prevent the execution of code.
> 

The object tag has always been able to run from My
Computer in this manner. I use it for testing zone
problems, which is how it was originally discovered.
This was the original assessment of the bug and the
reason why the potential was there for something
nastier.

from Microsoft (
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-015.asp
)

"In certain instances, IE incorrectly reckons these
objects as being part of the Local Computer zone, even
though the page itself is in a different zone, such as
the Internet zone. Because the Local Computer zone is
less restrictive than other zones, this can allow the
web page to run executables on the local system
without prompting."

from my addendum advisory (
http://groups.google.com/groups?q=pop-up+group:bugtraq&hl=en&selm=bugtraq/20020116183201.24698.qmail%40web12507.mail.yahoo.com&rnum=1
) :->

"The object is being executed in My Computer
security zone, ie, the codebase problem is a Microsoft
"feature", it just should only work in My Computer
Zone -- not remotely. "

Then I went on to explain why that is bad and
potentially exploitable.

<snip>

__________________________________________________
Do You Yahoo!?
Yahoo! Tax Center - online filing with TurboTax
http://taxes.yahoo.com/

Reply via email to