On Thursday 11 December 2003 3:07 pm, DB wrote:

> I saw a new IE exploit descibed as follows:
>
> ---------------------
> http://www.secunia.com/advisories/10395/
>
> Example displaying only "http://www.trusted_site.com"; in the address bar
> when the real domain is "malicious_site.com":
> http://[EMAIL PROTECTED]/malicious.html
> --------------------
>
> I'm trying to use an acl to prevent access to such urls. I tried this:
>
> acl ieflaw url_regex %01@
>
> and
>
> http_access deny ieflaw
>
> but this doesn't seem to do anything at all

This is a bit of a guess, but you might need to escape one or two of those 
characters?

acl ieflaw url_regex \%01\@

should be safe.

Also, from a discussion on another mailing list, I believe the exploit is 
still effective:

a) with one or more characters between the %01 and the @ (I don't know if 
there's an upper limit to how many can be instered)

b) with certain other non-printable characters in place of the %01

Antony.

-- 
There are two possible outcomes:

 If the result confirms the hypothesis, then you've made a measurement.
 If the result is contrary to the hypothesis, then you've made a discovery.

 - Enrico Fermi

                                                     Please reply to the list;
                                                           please don't CC me.

Reply via email to