Skip to comments.
Open source firm releases patch for IE spoofing flaw
The Age ^
|
December 18, 2003
| Sam Varghese
Posted on 12/18/2003 8:07:46 PM PST by Russian Sage
Open source firm releases patch for IE spoofing flaw
|
By Sam Varghese December 18, 2003
|
|
An open source and freeware software development web site has released a patch to fix the URL spoofing vulnerability in Internet Explorer, which can be exploited by scammers who try to trick people into revealing details of online banking accounts or other private information.
Openwares.org, a Vaunatian company, with branches in Israel, the US and France, released the patch and the source code for the same a couple of days back.
The company has also set up two pages where users can test to see if they are vulnerable to the exploit, one a fake Microsoft Update example and the other an example of a fake PayPal site.
In its advisory, issued along with the patch, Openwares.org said: "Successful exploitation (of this flaw) allows a malicious person to display an arbitrary FQDN (Fully Qualified Domain Name) in the address and status bars, which is different from the actual location of the page."
It gave the vulnerability a rating of 5 on a five-point scale.
While Microsoft has released an article providing details about the vulnerability, the company is yet to provide a patch.
The flaw was disclosed on December 9 by graphic designer Sam Greenhalgh.
TOPICS: Business/Economy; Miscellaneous; News/Current Events
KEYWORDS: ie; internetexplorer; opensource; patch
Navigation: use the links below to view more comments.
first 1-20, 21-24 next last
To: Russian Sage
Huh. Very interesting. The spoof does indeed work as it was said to. But I don't know that I want to mess with a patch that modifies any of my MS system files in some way. And I'm not enough of a computer guru to figure out what the patch does without more of an explanation, although they offer open source code as well as the patch.
I think I'll wait.
2
posted on
12/18/2003 8:15:04 PM PST
by
Cicero
(Marcus Tullius)
To: Russian Sage
So what is so hard about supplying a quick patch like this company did??? I installed this "patch" and it worked great.
3
posted on
12/18/2003 8:15:23 PM PST
by
smith288
("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
To: Cicero
Appears to be an ActiveX file... It doesnt mess with MS source code.
4
posted on
12/18/2003 8:17:48 PM PST
by
smith288
("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
To: Russian Sage
Mozilla is vulnerable as well. Does anyone know of a patch for it?
5
posted on
12/18/2003 8:53:25 PM PST
by
templar
To: templar
Mozilla is not vunerable.
6
posted on
12/18/2003 9:23:45 PM PST
by
sigSEGV
To: templar
I use Mozilla. It tests OK without a patch.
To: Russian Sage
I use Mozilla. It tests OK without a patch.What version? I'm using 1.5 and it failed the test that was posted on the other thread.
8
posted on
12/19/2003 6:06:39 AM PST
by
templar
To: sigSEGV
Mozilla is not vunerable.Mine, version 1.5, failed the test.
9
posted on
12/19/2003 6:08:25 AM PST
by
templar
To: templar
In what way did it fail? Did it show you the real URL in the status field or the fake url?
10
posted on
12/19/2003 6:10:31 AM PST
by
flashbunny
(The constitution doesn't protect only the things you approve of.)
To: rdb3; TechJunkYard; chance33_98; Calvinist_Dark_Lord; Dominic Harr; Bush2000; Nick Danger; ...
tech ping redirect. This is the original thread. I asked the admin moderator to delete mine.
thanks.
11
posted on
12/19/2003 6:12:17 AM PST
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: templar
12
posted on
12/19/2003 7:19:48 AM PST
by
sigSEGV
To: All
DO NOT install the Open Source patch! It introduces a buffer overflow vulnerability which is worse than the original problem.
A perfect example of jumping the gun, IMHO.
See the updated piece at The Register.
To: smith288
See
#13 and un-install that patch, if you can.
To: TechJunkYard
Thanks
15
posted on
12/19/2003 8:01:16 AM PST
by
smith288
("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
To: Russian Sage
BUMP
16
posted on
12/19/2003 8:25:51 AM PST
by
kitkat
To: smith288
I decided not to install it because there wasn't enough information on the web site about what it did or whether it could be fully uninstalled. Also I was worried that it might not be compatible with whatever patch MS finally decides to release.
Does it show up in Add/Remove Programs for uninstalling? Have you tried uninstalling it?
17
posted on
12/19/2003 8:37:00 AM PST
by
Cicero
(Marcus Tullius)
To: Cicero
Im at work now but ill see when I get home...
18
posted on
12/19/2003 8:39:33 AM PST
by
smith288
("We're going to have the happiest Christmas since Bing Crosby tap danced with Danny F'n Kay")
To: Cicero
Powder..Patch..Ball FIRE!
The patch does what it is supposed to do. I downloaded it this morning and it works just as expected. IE6 on NT4 SP6 Compaq laptop.
To: Cicero
From what I'm reading, it doesn't actually
fix the problem; it just detects exploited URLs and sends you to a warning page instead of the exploit page.
But it uses only a 256-byte buffer with no overflow checking, and their web site may be accumulating a list of exploited URLs and user IP addresses.
My advice is to ignore this thing and wait for the official Microsoft patch.
Navigation: use the links below to view more comments.
first 1-20, 21-24 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson