[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3F194DDE9CB3B64C9902A013994D7F8E3A9D76@exchange2k.tshore.com>
Date: Thu, 19 May 2005 07:59:07 -0400
From: "Steve Bostedor" <Steveb@...ore.com>
To: "Bakchodiya" <bakchodiya@...oo.com>, <bugtraq@...urityfocus.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: RE: Security issue in Microsoft Outlook
Doesn't seem to be a problem in Outlook 2003. I made one for
http://www.vncscan.com and then followed your instructions to change it
to www.hackme.com and it still went to hackme.com.
- Steve Bostedor
http://www.vncscan.com
The Real VNC Manager
> -----Original Message-----
> From: Bakchodiya [mailto:bakchodiya@...oo.com]
> Sent: Wednesday, May 18, 2005 4:28 PM
> To: bugtraq@...urityfocus.com
> Cc: full-disclosure@...ts.grok.org.uk
> Subject: Security issue in Microsoft Outlook
>
> An issue has been discovered in MS Outlook (All
> Versions) where anyone can fake a URL & send it across.
>
> How does it work:
>
> Lets compose an email in MS Outlook, lets type
>
>
> http://www.cybertrion.com & put a space after it to make it a
> link. Now put your cursor just before cybertrion & type any
> URL for eg:
> http://www.foo-labs.info now send it to anyone. The receiver
> will see the URL as http://www.foo-labs.info but when he
> clicks on it it will directly take him to http://www.cybertrion.com
>
> I am not sure how critical this is but it can fool alot of
> people & result in download of a virus.
>
> For more details and Discovered by:
> Cybertrion Systems,
> http://www.cybertrion.com
>
>
>
> __________________________________
> Do you Yahoo!?
> Yahoo! Mail - Find what you need with new enhanced search.
> http://info.mail.yahoo.com/mail_250
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists