lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4215831E.40104@forwardtechnology.net>
Date: Fri, 18 Feb 2005 00:54:38 -0500
From: Greg Merideth <gmerideth@...wardtechnology.net>
To: Jay Calvert <jcalvert@...aneronetworks.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: Phishing hole found in IE and OE


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In the last trunk build I did of Firefox (win32 build roughly 2-3 nights
ago) I see "http://ebay.com/" in the lower status bar on the test page.
~ Clicking the link takes me to ebay.  I do not see
"http://spreadfirefox.com".

Jay Calvert wrote:
|
| Another major vulnerability has been found in Microsoft's Internet
Explorer and Outlook Express. The flaw is in the way that these
applications can be manipulated in simple HTML code to display an URL
other than the one specified in a link, to be displayed in the status bar.
|
| The status bar is the first place users look, or at least should look
when following any link in an email or on a website to ensure that the
link is taking them to where it says it is. HTML that utilizes this
vulnerability can change what is displayed in the status bar of these
applications, thus leading to a possible major phishing hole that can be
used in very serious ways.
|
| An example and this article can be seen at:
http://habaneronetworks.com/viewArticle.php?ID=140
|

- --
~         '''''
~        ( o.o )
====oOOO==(_)==OOOo==============================
~ Greg Merideth
~ Forward Technology, LLC.
~ 866.366.5585 x 103
~ gmerideth@...wardtechnology.net
===========================================PGPKEY
~         5912CED0BF361EC23C67F509C6EB5AB49AEAC107
=================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (MingW32)

iD8DBQFCFYMexutatJrqwQcRAnzRAJ0e8cWAmyg8b9P4PoizpfDdqu0DggCg1+D5
ZxuwoDkRWTK+vI+jm2+9A6c=
=Buec
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ