lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050520182449.GA20006@force.stwing.upenn.edu>
Date: Fri, 20 May 2005 14:24:50 -0400
From: Dan Margolis <bugtraq.lists.dmargoli@....net>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Security issue in Microsoft Outlook


On Wed, May 18, 2005 at 01:27:45PM -0700, Bakchodiya wrote:
> An issue has been discovered in MS Outlook (All
> Versions) where anyone can fake a URL & send it
> across.
> 
> How does it work:
> 
> Lets compose an email in MS Outlook, lets type
> 
> 
> http://www.cybertrion.com & put a space after it to
> make it a link. Now put your cursor just before
> cybertrion & type any URL for eg: 
> http://www.foo-labs.info now send it to anyone. The
> receiver will see the URL as http://www.foo-labs.info
> but when he clicks on it it will directly take him to
> http://www.cybertrion.com
> 
> I am not sure how critical this is but it can fool
> alot of people & result in download of a virus.

Wow. MS really fucked up on this one. 

FYI, though, I've confirmed this vulnerability on Outlook 2003, IE6,
and, shockingly, Mozilla Thunderbird, Firefox, Opera, and Safari. In
fact, it almost seems as if *every* browser or other application that
renders HTML has this "feature" of displaying the text inside a <a> tag!

I, for one, am shocked and apalled that anyone could be so irresponsible
as to write such a vulnerability into production code. By allowing
links in their HTML pages, application writers make it trivially easy to
trick viewers into visiting web sites they didn't intend to! This can
lead to phishing attacks, viruses, widespread panic, and mass hysteria! 

Severity ranking: High!

PS: If you weren't talking about just changing the link text, I
apologize for the above sarcasm. 

-- 
Dan
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ