Forum Moderators: wheatpenny Forum Coordinators: Anim8dtoon
Community Center F.A.Q (Last Updated: 2025 Jan 22 10:24 am)
Internet Explorer Remote Information Disclosure Description: Microsoft Internet Explorer is affected by a remote information disclosure issue. The application fails to properly secure scripts that reside on a local computer. If a user navigates to a remote malicious script, it is possible for the remote malicious script to load and execute. All current versions of Internet Explorer are affected. Ref: http://secunia.com/advisories/13872/
This site uses cookies to deliver the best experience. Our own cookies make user accounts and other features possible. Third-party cookies are used to display relevant ads and to analyze how Renderosity is used. By using our site, you acknowledge that you have read and understood our Terms of Service, including our Cookie Policy and our Privacy Policy.
MODERATE: Internet Explorer File Download Security Warning Bypass
Affected:
Internet Explorer on XP SP2
Description: It has been reported that the security warning (information
bar) presented to the users, while downloading executable files from the
Internet, can be bypassed in Internet Explorer on XP SP2. HTML pages,
which dynamically create a frame with its source as an executable file,
can be used for such a purpose. A malicious webpage may exploit this
flaw to download malware like Spyware or adware on the Windows clients.
A proof-of-concept exploit is included in the discoverer's posting. Note
that the "standard" file download dialogue is still presented to the
user prior to the download. Hence, the flaw can be exploited only with
user interaction.
Status: Microsoft not confirmed, no patches available.
Please refer to the links in the references for configuring IE with limited privileges as a general IE security trick.
Council Site Actions: All council sites are waiting for confirmation and
a patch from Microsoft. Several sites said that they would roll out the
patch during their next regularly scheduled system update process.
References:
Posting by Rafel Ivgi
http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0475.html
IE Configuration Hardening Tricks
http://archives.neohapsis.com/archives/ntbugtraq/2005-q1/0031.html
http://msdn.microsoft.com/security/securecode/columns/default.aspx?pull=/library/en-us/dncode/html/secure11152004.asp
SecurityFocus BID
http://www.securityfocus.com/bid/12264