>>The shell:windows code does work in IE, the only difference being that it displays a dialogue box when referenced asking if the user wishes to open or save the file. Combine that with a little social engineering and you've got a potential compromise.
This behavior is indistinguishable from that of a simple href to the file itself, so there's no point in bringing in the shell: stuff. If you want to assume a little social engineering can do anything than a simple href is a vulnerability for any browser. >>>>Also, when the shell:windows reference is input into IE's address bar field, it executes the code without a a dialogue box... Gimme a break. This is not a meaningful problem. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.ziffdavis.com/seltzer [EMAIL PROTECTED] _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
