Heeter
Overclocked Like A Mother
- Joined
- 8 Jul 2002
- Messages
- 2,732
A cut 'n' paste from Bink.nu.
Critical: Moderately critical
Impact: Security Bypass
Where: From remote
Software: Microsoft Internet Explorer 6
Description:
http-equiv has identified a vulnerability in Internet Explorer, allowing malicious web sites to spoof the file extension of downloadable files.
The problem is that Internet Explorer can be tricked into opening a file, with a different application than indicated by the file extension. This can be done by embedding a CLSID in the file name. This could be exploited to trick users into opening "trusted" file types which are in fact malicious files.
Secunia has created an online test:
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/
This has been reported to affect Microsoft Internet Explorer 6.
NOTE: Prior versions may also be affected.
Solution:
Do not use "Open" file, always save files to a folder as this reveals the suspicious filename.
Provided and/or discovered by:
http-equiv
News Source: MSFN.org
Heeter
Critical: Moderately critical
Impact: Security Bypass
Where: From remote
Software: Microsoft Internet Explorer 6
Description:
http-equiv has identified a vulnerability in Internet Explorer, allowing malicious web sites to spoof the file extension of downloadable files.
The problem is that Internet Explorer can be tricked into opening a file, with a different application than indicated by the file extension. This can be done by embedding a CLSID in the file name. This could be exploited to trick users into opening "trusted" file types which are in fact malicious files.
Secunia has created an online test:
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/
This has been reported to affect Microsoft Internet Explorer 6.
NOTE: Prior versions may also be affected.
Solution:
Do not use "Open" file, always save files to a folder as this reveals the suspicious filename.
Provided and/or discovered by:
http-equiv
News Source: MSFN.org
Heeter