Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Powerful Flaw Found in IE Hole could allow scammers to hide the true address of Web pages
pcworld.com ^ | December 10, 2003 | pcworld.com

Posted on 12/10/2003 4:19:33 PM PST by Print

A newly discovered vulnerability in Microsoft's Internet Explorer browser could be a powerful new tool for scammers, allowing them to convincingly mask the real origin of Web pages used to trick targets into revealing sensitive information.

Attackers could use a specially crafted URL to display a different domain name in the address bar than the Web page's actual location. This practice is known as "spoofing."

Full article HERE


TOPICS: Miscellaneous
KEYWORDS: computer; computersecurity; internet; lowqualitycrap; microsoft; security; windows
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-72 next last
An illustration of the bug in IE.
1 posted on 12/10/2003 4:19:34 PM PST by Print
[ Post Reply | Private Reply | View Replies]

To: Print
E-mail and IP spoofing have been around for years and it is not a IE flaw, but a html flaw.
2 posted on 12/10/2003 4:21:05 PM PST by Paul C. Jesup
[ Post Reply | Private Reply | To 1 | View Replies]

To: Print; High-tech Redneck
Boy howdy! that's awful.
3 posted on 12/10/2003 4:24:09 PM PST by glock rocks (molon labe)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paul C. Jesup
"E-mail and IP spoofing have been around for years and it is not a IE flaw, but a html flaw.

No, this is IE flaw. Mozilla which doesn't have this flaw.

4 posted on 12/10/2003 4:24:14 PM PST by Print
[ Post Reply | Private Reply | To 2 | View Replies]

To: Print
Should read: Mozilla doesn't have this flaw.
5 posted on 12/10/2003 4:25:02 PM PST by Print
[ Post Reply | Private Reply | To 4 | View Replies]

To: Paul C. Jesup
This is URL spoofing, not email or IP spoofing. It's indeed an IE flaw. I went there and Konqueror displayed the full URL.
6 posted on 12/10/2003 4:25:40 PM PST by B Knotts (Go 'Nucks!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Print
Switch to OPERA.

www.opera.com

It's free, or you can buy the upgrade.

7 posted on 12/10/2003 4:29:18 PM PST by TaxRelief (They say you are what you eat, so I guess I'm "fresh". Some other folks are "well-preserved".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paul C. Jesup
E-mail and IP spoofing have been around for years and it is not a IE flaw, but a html flaw.

No, Mozilla Firebird displays the entire URL:

http://www.microsoft.com%01@zapthedingbat.com/security/ex01/vun2.htm

8 posted on 12/10/2003 4:29:32 PM PST by justlurking
[ Post Reply | Private Reply | To 2 | View Replies]

To: justlurking
IE will show the source if you just go to the View Folder and click view, but then most people don't even take to time to learn how to properly use IE. I have also figured out how to prevent pop-ups without pop-up programs. The key is to understand and use the 'Internet', 'Trusted' and 'Restricted' options in Security section of IE's settings
9 posted on 12/10/2003 4:36:00 PM PST by Paul C. Jesup
[ Post Reply | Private Reply | To 8 | View Replies]

To: justlurking
IE will show the source if you just go to the View Folder and click SOURCE, but then most people don't even take to time to learn how to properly use IE. I have also figured out how to prevent pop-ups without pop-up programs. The key is to understand and use the 'Internet', 'Trusted' and 'Restricted' options in Security section of IE's settings
10 posted on 12/10/2003 4:36:15 PM PST by Paul C. Jesup
[ Post Reply | Private Reply | To 8 | View Replies]

To: Print
Opera's response when I pressed [test exploit]:






Security warning:

You are about to go to an address containing a username.

Username: www.microsoft.com
Server: zapthdingvat.com

Are you sure you want to go to this address?

[yes][no]






And Opera is FREE!
11 posted on 12/10/2003 4:36:36 PM PST by TaxRelief (They say you are what you eat, so I guess I'm "fresh". Some other folks are "well-preserved".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paul C. Jesup
...most people don't even take to time to learn how to properly use IE...The key is to understand and use the 'Internet', 'Trusted' and 'Restricted' options

Microsoft should not make it so difficult for the average user to understand the options. It should also be safe by default.

12 posted on 12/10/2003 4:39:54 PM PST by TaxRelief (They say you are what you eat, so I guess I'm "fresh". Some other folks are "well-preserved".)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Print
Well, I use ms Internet Explorer and I went to the 'test' site;
and I clicked on 'test exploit' and I got this message:

Location in address bar should be http://www.microsoft.com

And guess what?

The location in my adress bar said http://www.microsoft.com

So - what is the problem?
13 posted on 12/10/2003 4:41:29 PM PST by DefCon
[ Post Reply | Private Reply | To 1 | View Replies]

To: TaxRelief
Microsoft should not make it so difficult for the average user to understand the options. It should also be safe by default.

Okay, I'll go along with that, but on the other side of the coin, Linux should not make it so difficult for the average user to understand how to use it. ;P

14 posted on 12/10/2003 4:42:10 PM PST by Paul C. Jesup
[ Post Reply | Private Reply | To 12 | View Replies]

To: Paul C. Jesup
I'd have to disagree, it you look at the site in competing browsers, only IE is tricked.
15 posted on 12/10/2003 4:42:37 PM PST by bobwoodard
[ Post Reply | Private Reply | To 2 | View Replies]

To: DefCon
Well, when they say "should be," they mean "should be" if the exploit succeeds. Which it did, in your browser.
16 posted on 12/10/2003 4:46:08 PM PST by B Knotts (Go 'Nucks!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Print
It fooled Visual Route - I use this to help track web sites & emails back to source.



=== VisualRoute report on 10-Dec-03 6:44:56 PM ===


Report for www.microsoft.com [207.46.134.157]

Analysis: Connections to HTTP port 80 on host 'www.microsoft.com' [origin2.microsoft.com] are working, but ICMP packets are being blocked
past network "207.46.155.0" at hop 15. It is a HTTP server (running Microsoft-IIS/6.0).

17 posted on 12/10/2003 4:46:21 PM PST by steplock (www.FOCUS.GOHOTSPRINGS.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paul C. Jesup
Hmmm... so you're saying the proper way to browse is to inspect each site's page in source view, adjust your browser security settings and then proceed according to your preferences? I guess this would especially needed for those sites that use library files (good luck showing people how to download those!).

Whew, I get tired just thinking about it.

18 posted on 12/10/2003 4:48:07 PM PST by bobwoodard
[ Post Reply | Private Reply | To 10 | View Replies]

Comment #19 Removed by Moderator

Comment #20 Removed by Moderator


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-72 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson