Skip to comments.
IE Flaw Exposes Weakness In Yahoo! Filtering
The Register ^
| John Leyden
Posted on 03/24/2004 5:00:42 PM PST by LaserLock
Flaws in the filtering technology used by Web-based email services make it possible for hackers to smuggle viruses past defences. Israeli security outfit GreyMagic Software warned today that this "severe security" vulnerability could allow attackers to run code of their choice, "simply by sending an email to an unsuspecting Hotmail or Yahoo! user". When the victim attempts to read this email, the code executes to potentially dire consequence (e.g. theft of the user's login and password, seizure of machines etc.). The problem stems from a Cross-Site Scripting vulnerability involving IE. To blame is a new way to embed script involving an IE technology called HTML+TIME (based on SMIL), which is meant to add timing and media synchronization support to HTML pages. The flaw weakens the ability of Web-based email services to screen this type of HTML content for malicious code. But users with up-to-date anti-virus scanners and personal firewalls are likely to be protected, even if hackers punch through that layer of defence. GreyMagic has alerted Microsoft to this issue and worked with the company to fix the vulnerability in Hotmail. Hotmail is no longer vulnerable. Unfortunately, all attempts by GreyMagic to contact Yahoo's security department failed; so Yahoo! webmail is still vulnerable.
TOPICS: Announcements; Extended News; Miscellaneous; Technical
KEYWORDS: computersecurity
1
posted on
03/24/2004 5:00:43 PM PST
by
LaserLock
To: LaserLock
to smuggle viruses past defences I read an article recently that said one guy sent a message to 30 co-workers that read "Do not open this attachment - it contains a virus and it will damage your computer".
The attachment was a program simply to report that "the attachment was opened by IP #xxx.xxx", so the sender knew who opened it.
He got 18 responses.
2
posted on
03/24/2004 5:21:06 PM PST
by
Izzy Dunne
(Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
To: LaserLock
Unfortunately, all attempts by GreyMagic to contact Yahoo's security department failed; so Yahoo! webmail is still vulnerable. So, GreyMagic decided to publish the vulnerability, so that hackers everywhere have a chance to punish Yahoo by writing a virus in the next week or so.
GreyMagic's action is very irresponsible.
To: LaserLock
Flaws in the filtering technology used by Web-based email services make it possible for hackers to smuggle viruses past defences.This is a job for Richard Clarke. If he can't stop it no one can!
4
posted on
03/24/2004 5:34:07 PM PST
by
Azzurri
To: Tax Government
So, GreyMagic decided to publish the vulnerability, so that hackers everywhere have a chance to punish Yahoo by writing a virus in the next week or so.
GreyMagic's action is very irresponsible.
- Discovered on March 6th.
- Started working with Microsoft on March 11th.
- Presumedly tried to contact Yahoo! about the same time.
- Announced on March 23rd.
Source.
So what would you do? Would you still be sitting on it, hoping and praying that Yahoo! would finally look at their e-mail? Would you ever announce?
GreyMagic is a software security firm just doing its job. Yahoo security should be doing its job, but is apparently asleep at the switch.
To: TechJunkYard
I guarantee you that I, with just a telephone and email acct, and no "in's" at Yahoo and no particular strings to pull, can get somebody's attention in 24 hours, high enough in that org to take action on a threat such as this.
To: TechJunkYard
You don't get it do you. He had to go public without describing the exact nature of the threat. It's not only Yahoo. As it stands now, Microsoft gets competitive advantage over Yahoo because of ... Microsoft's poor code. This guy is a disgrace. There is no proof that "presumably" he contacted Yahoo. I'd say that "presumably" MS contacted him to announce the bug they just fixed in order to damage Yahoo. What proof is there for either?
7
posted on
03/24/2004 9:07:45 PM PST
by
CrucifiedTruth
(The Crucified Truth lives forever.)
To: TechJunkYard
To your question, what would I do... I would NOT publish the details of the vulnerability until it had been corrected, since that guarantees it will be aggressively exploited. Instead, I would do this:
1) try to contact Yahoo through its switchboard;
2) within 24 hours, notify some organizations interested in computer security, seeking their help to find the balance between warning the public, without disclosing the exploit in great detail;
3) within 24 hours, notify the FBI and/or Dept. of Homeland Security. They certainly have an interest, and could get the attention of a person or group at Yahoo, when a private individiual or company might not.
What I would NOT do is describe the vulnerability in detail in public, until the people who had a responsibility and ability to fix it had been effectively notified.
The conclusion I am drawn to is that this organization used the vulnerability as a way to get publicity for itself, and in so doing, put the public at increased risk. And, possibly, people at Microsoft saw in publishing Yahoo's failure to fix it, a way to one-up Yahoo.
To: Tax Government
People interested in Windows security might not know about the Baseline Security Analyzer. I just found out; excuse me if you already do. Doubtless many of you already knew.
Go to
http://www.microsoft.com ; search for Baseline Security Analyzer.
To: LaserLock
Bump
10
posted on
03/24/2004 9:21:49 PM PST
by
Fiddlstix
(This Space Available for Rent or Lease by the Day, Week, or Month. Reasonable Rates. Inquire within.)
To: Izzy Dunne; glock rocks
"The attachment was a program simply to report that "the attachment was opened by IP #xxx.xxx", so the sender knew who opened it.
He got 18 responses."
And nobody recognized this as unsatisfied employees wanting a few days off while the network computer system was being rebuilt?
11
posted on
03/25/2004 9:16:30 PM PST
by
B4Ranch
(" A nation that cannot control it's borders is not a nation" President Reagan)
To: LaserLock
No surprise here. IE and Outlook have been banned from my PC at home for security reasons. Now I'm using the Mozilla browser and mail client at home, but still have to use Micro$uck's rickety bloatware at the office.
12
posted on
03/26/2004 8:23:48 AM PST
by
FierceDraka
(Service and Glory!)
To: TechJunkYard
Maybe Yahoo's security is offshored and they are asleep during our day-shift.
13
posted on
03/26/2004 1:48:54 PM PST
by
ninenot
(Minister of Membership, TomasTorquemadaGentlemen'sClub)
To: Professional Engineer
ping
14
posted on
03/27/2004 9:08:50 PM PST
by
msdrby
(US Veterans: All give some, but some give all.)
To: Izzy Dunne
...co-workers that read "Do not open this attachment - it contains a virus and it will damage your computer". I've seen this happen. Several years ago, a virus hit my office. I told all my coworkers to not open so and so message. One did. Twit
15
posted on
03/28/2004 1:24:54 PM PST
by
Professional Engineer
(3/11/04 saw the launching of the Moorish reconquest of Spain.)
To: Tax Government
GreyMagic's action is very irresponsible. So then what do you call CERT advisories ? Criminal negligence ?
I think it was good of them to warn the public that their platform is weakened.
16
posted on
03/28/2004 1:27:51 PM PST
by
Centurion2000
(Resolve to perform what you must; perform without fail that what you resolve.)
To: Centurion2000
GreyMagic should have tried harder than they did to get the Yahoo problem fixed. Their decision to "notify the world, because they couldn't get through to Yahoo" is self-serving and not credible.
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson