>From the KB article:

<An attacker could use this vulnerability in either of two scenarios. She
could host an affected HTML e-mail on a web site and try to persuade another
user to visit it, at which point script on a web page could open the mail
and initiate the executable. Alternatively, she could send the HTML mail
directly to the user. In either case, the executable attachment, if it ran,
would be limited only by user�s permissions on the system.>

??? What is meant by "host an affected HTML e-mail on a web site and try to
persuade another user to visit it"?  How do you host an email on a web site?
Can't quite get my mind around that one.

How about this:

<Tested Versions:
Microsoft tested IE 5.01 and IE 5.5 to assess whether they are affected by
this vulnerability. Previous versions are no longer supported and may or may
not be affected by this vulnerability.>

I love the little bit below.  I'm sure someone will find the time to test it
for them.

Jim



----- Original Message -----

From: "Michael Dinowitz" <[EMAIL PROTECTED]>
To: "CF-Server" <[EMAIL PROTECTED]>
Sent: Friday, March 30, 2001 2:59 AM
Subject: (Security) Incorrect MIME Header Can Cause IE to Execute E-mail
Attachment


> All mail sent to any House of Fusion mailing list has its headers
rewritten
> and HTML content removed. This means that you will not receive any emails
to
> the list that can take advantage of the below mentioned security hole. I'm
> posting this to the list so that all list members using MS IE 5.01 or 5.5
to
> read their mail can take proper precautions. Thank you and may you be
> secure.
>
> This vulnerability exists because Internet Explorer does not handle MIME
> (Multipurpose Internet Mail Extensions) headers in HTML e-mails correctly.
> If a malicious user sends an affected HTML e-mail or hosts an affected
> e-mail on a Web site, and a user opens the e-mail or visits the Web site,
> Internet Explorer automatically runs the executable on the user's
computer.
> If this occurs, the executable can take any action on the computer that
the
> user can take, including adding, changing, or deleting data, communicating
> with Web sites, or reformatting the hard drive. This update eliminates the
> vulnerability by correcting the way Internet Explorer handles MIME headers
> in HTML e-mails, preventing e-mails from automatically launching
executable
> attachments.
>
> http://www.microsoft.com/technet/security/bulletin/MS01-020.asp
>
> Michael Dinowitz
> Publisher: Fusion Authority weekly news alert
> (www.fusionauthority.com/alert)
> Listmaster: CF-Talk, CF-Jobs, Spectra-Talk, Jrun-Talk, etc.
> (www.houseoffusion.com)
>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
------------------------------------------------------------------------------
To unsubscribe, send a message to [EMAIL PROTECTED] with 
'unsubscribe' in the body or visit the list page at www.houseoffusion.com

Reply via email to