Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Open source firm releases patch for IE spoofing flaw
The Age ^ | December 18, 2003 | Sam Varghese

Posted on 12/18/2003 8:07:46 PM PST by Russian Sage

Open source firm releases patch for IE spoofing flaw

By Sam Varghese
December 18, 2003



An open source and freeware software development web site has released a patch to fix the URL spoofing vulnerability in Internet Explorer, which can be exploited by scammers who try to trick people into revealing details of online banking accounts or other private information.

Openwares.org, a Vaunatian company, with branches in Israel, the US and France, released the patch and the source code for the same a couple of days back.

The company has also set up two pages where users can test to see if they are vulnerable to the exploit, one a fake Microsoft Update example and the other an example of a fake PayPal site.

In its advisory, issued along with the patch, Openwares.org said: "Successful exploitation (of this flaw) allows a malicious person to display an arbitrary FQDN (Fully Qualified Domain Name) in the address and status bars, which is different from the actual location of the page."

It gave the vulnerability a rating of 5 on a five-point scale.

While Microsoft has released an article providing details about the vulnerability, the company is yet to provide a patch.

The flaw was disclosed on December 9 by graphic designer Sam Greenhalgh.


TOPICS: Business/Economy; Miscellaneous; News/Current Events
KEYWORDS: ie; internetexplorer; opensource; patch
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 12/18/2003 8:07:47 PM PST by Russian Sage
[ Post Reply | Private Reply | View Replies]

To: Russian Sage
Huh. Very interesting. The spoof does indeed work as it was said to. But I don't know that I want to mess with a patch that modifies any of my MS system files in some way. And I'm not enough of a computer guru to figure out what the patch does without more of an explanation, although they offer open source code as well as the patch.

I think I'll wait.
2 posted on 12/18/2003 8:15:04 PM PST by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Russian Sage
So what is so hard about supplying a quick patch like this company did??? I installed this "patch" and it worked great.
3 posted on 12/18/2003 8:15:23 PM PST by smith288 ("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cicero
Appears to be an ActiveX file... It doesnt mess with MS source code.
4 posted on 12/18/2003 8:17:48 PM PST by smith288 ("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Russian Sage
Mozilla is vulnerable as well. Does anyone know of a patch for it?
5 posted on 12/18/2003 8:53:25 PM PST by templar
[ Post Reply | Private Reply | To 1 | View Replies]

To: templar
Mozilla is not vunerable.
6 posted on 12/18/2003 9:23:45 PM PST by sigSEGV
[ Post Reply | Private Reply | To 5 | View Replies]

To: templar
I use Mozilla. It tests OK without a patch.
7 posted on 12/18/2003 10:25:30 PM PST by Russian Sage
[ Post Reply | Private Reply | To 5 | View Replies]

To: Russian Sage
I use Mozilla. It tests OK without a patch.

What version? I'm using 1.5 and it failed the test that was posted on the other thread.

8 posted on 12/19/2003 6:06:39 AM PST by templar
[ Post Reply | Private Reply | To 7 | View Replies]

To: sigSEGV
Mozilla is not vunerable.

Mine, version 1.5, failed the test.

9 posted on 12/19/2003 6:08:25 AM PST by templar
[ Post Reply | Private Reply | To 6 | View Replies]

To: templar
In what way did it fail? Did it show you the real URL in the status field or the fake url?
10 posted on 12/19/2003 6:10:31 AM PST by flashbunny (The constitution doesn't protect only the things you approve of.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: rdb3; TechJunkYard; chance33_98; Calvinist_Dark_Lord; Dominic Harr; Bush2000; Nick Danger; ...
tech ping redirect. This is the original thread. I asked the admin moderator to delete mine.

thanks.

11 posted on 12/19/2003 6:12:17 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: templar
You sure about that?

Did you see:

www.microsoft.com%01@zapthedingbat.com/security/ex01/vun2.htm
or
www.microsoft.com

in the address bar?
12 posted on 12/19/2003 7:19:48 AM PST by sigSEGV
[ Post Reply | Private Reply | To 9 | View Replies]

To: All
DO NOT install the Open Source patch! It introduces a buffer overflow vulnerability which is worse than the original problem.

A perfect example of jumping the gun, IMHO.

See the updated piece at The Register.

13 posted on 12/19/2003 7:38:25 AM PST by TechJunkYard
[ Post Reply | Private Reply | To 12 | View Replies]

To: smith288
See #13 and un-install that patch, if you can.
14 posted on 12/19/2003 7:46:54 AM PST by TechJunkYard
[ Post Reply | Private Reply | To 3 | View Replies]

To: TechJunkYard
Thanks
15 posted on 12/19/2003 8:01:16 AM PST by smith288 ("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
[ Post Reply | Private Reply | To 14 | View Replies]

To: Russian Sage
BUMP
16 posted on 12/19/2003 8:25:51 AM PST by kitkat
[ Post Reply | Private Reply | To 1 | View Replies]

To: smith288
I decided not to install it because there wasn't enough information on the web site about what it did or whether it could be fully uninstalled. Also I was worried that it might not be compatible with whatever patch MS finally decides to release.

Does it show up in Add/Remove Programs for uninstalling? Have you tried uninstalling it?
17 posted on 12/19/2003 8:37:00 AM PST by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Cicero
Im at work now but ill see when I get home...
18 posted on 12/19/2003 8:39:33 AM PST by smith288 ("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
[ Post Reply | Private Reply | To 17 | View Replies]

To: Cicero
Powder..Patch..Ball FIRE!

The patch does what it is supposed to do. I downloaded it this morning and it works just as expected. IE6 on NT4 SP6 Compaq laptop.

19 posted on 12/19/2003 8:41:42 AM PST by BallandPowder
[ Post Reply | Private Reply | To 2 | View Replies]

To: Cicero
From what I'm reading, it doesn't actually fix the problem; it just detects exploited URLs and sends you to a warning page instead of the exploit page.

But it uses only a 256-byte buffer with no overflow checking, and their web site may be accumulating a list of exploited URLs and user IP addresses.

My advice is to ignore this thing and wait for the official Microsoft patch.

20 posted on 12/19/2003 8:44:03 AM PST by TechJunkYard
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson