Free Republic
Browse · Search
News/Activism
Topics · Post Article

Mac users of Microsoft Internet Explorer are not affected by this massive security hole. Windows users might want to switch to Netscape, Mozilla or Opera. Better yet, get a Mac! Or you could save your investment in Intel hardware and go with Linux
1 posted on 12/11/2001 9:11:38 PM PST by toupsie
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-22 next last
To: toupsie
Better yet, get a Mac!

For a direct download link try store.apple.com

2 posted on 12/11/2001 9:21:46 PM PST by Mid-MI Student
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
--- Welcome to Microsoft ---

Proudly Cranking Out
Low-Quality Crap
Everyday!

3 posted on 12/11/2001 9:25:44 PM PST by HAL9000
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
I'm already using Netscape, and I'm fiddling with Linux. And I'm gloating - can you hear me? (Gloat gloat)
6 posted on 12/11/2001 9:34:33 PM PST by dandelion
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
I wonder if the Flying Monkeys here on Free Republic will seriously admit that the Wicked Wizard's software has a flaw, or if they'll try to distract with feeble wisecracks questioning the intelligence, sexuality and patriotism of anyone who uses non-Microsoft products.
12 posted on 12/11/2001 9:47:13 PM PST by JoeSchem
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
I thought this was particularly funny.

Scroll down to the listing for Downloads and disable file downloads.

So, in order to be safe, don't use your browser to download ZoneAlarm, security patches, music files, pictures or anything else.

I'm glad I don't use Microsoft anymore. This would even screw up my old habit of only using IE to download Netscape.

Those of us that have thrown off the Microsoft shackles wonder why the rest of you still put up with this crap.

Knitebane

15 posted on 12/11/2001 9:51:07 PM PST by Knitebane
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Agreed. However, I recently "upgraded" to Opera 6.0. It is still beta. Numerous bugs, but still better than IE.
26 posted on 12/11/2001 10:16:59 PM PST by paul544
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Get a Mac (as you said), and use iCab as your browser.

Best internet program I have used to date.

46 posted on 12/12/2001 2:18:51 AM PST by Hugh Akston
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
extremely vague description ... publicity seeking?
51 posted on 12/12/2001 3:16:59 AM PST by fnord
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
So you're saying that MS based virii won't run on high-dollar Macs?

Probably true, but it also means that Mac virii won't run on Windows. Seems logical ...

54 posted on 12/12/2001 3:29:04 AM PST by fnord
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Or you could save your investment in Intel hardware and go with Linux

Linux runs on Intel processors and has for a long time, and if you do any sort of search on the web, you will find more Unix exploits for the script kiddies than you can shake a stick at. No operating system is hacker proof unless it is completely isolated from the outside world. Even Macs. The only reason Macs don't get hacked so much is that hackers generally hack servers, which are almost always either MS or Unix based. Apple has virtually no presence in the sever world (and yes, I was a Mac evangelist for years as I watched Apple squander every single marketing edge it had through utter, complete corporate stupidity. Now they've become a Unix box after years of inability to get a revamped Mac OS out the door. Not exactly sterling credentials there. But yeah, Macs look cool and heck, Gates never managed to get Ridley Scott to do a Windows commercial, so Apple gets points for that.)

56 posted on 12/12/2001 3:41:33 AM PST by RogueIsland
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Unless I am reading this wrong, there is some hype going on here. The information in the article (Newsbytes) does not match up with what is on the actual web site of the person who found this "devastating" security hole.

Here is what the Newsbytes article says:

Microsoft [NASDAQ:MSFT] will patch a flaw in its Web browser that could allow an attacker to silently download and execute malicious programs on the computers of users who view a specially constructed Web page or e-mail message.

But when you go to the web site that describes the bug, it says this:

A piece of HTML can be used to cause a normal download dialog to pop up. The dialog would prompt the user to choose whether he/she wants to "open this file from its current location" or "save this file to disk". The file name and extension may be anything the malicious website administrator (or a user having access there) wishes, e.g. README.TXT, index.html, or sample.wav. If the user chooses the first alternative, "open the file from its current location", an .EXE application is actually run without any further dialogs.

So, the article says that the attacker can "silently download and execute malicious programs" - that's not true. The web site it references says that IE will first pop up a dialog and ask you whether you want to open the download or save it to disk. It's not silent - it asks first.

If you are a fool, and choose to open the download it without examining what you downloaded first, you get bit.

The real bug is that it apparently displays a spoofed filename in the dialog. But it doesn't silently download anything as the article says - am I reading this wrong?

77 posted on 12/12/2001 6:20:08 AM PST by Mannaggia l'America
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Macs are for wienies !!
78 posted on 12/12/2001 6:21:50 AM PST by aspiring.hillbilly
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
I've got MacOS 9.1 and Opera at home, and Linux with Konqueror a work.

If you buy products from a vertical trust, you can expect low quality products.

I am proud that the rock-ribbed Republican State of Kansas of which I am a resident is still pursuing the break-up or at least severe legal restraint of Microsoft. I suggest that all lovers of the free market read the history of the trusts, and observe that Microsoft, like the trusts of the 19th century could not have obtained its dominant market position nor pursued it's vertical trust strategy without use of state power: gov't standardization, extreme applications of intellectual property law,...

For those who do not think MS is a trust, I suggest studying the Guggenheims' business strategy, not the Rockerfellers'. MS is a vertical trust like the Guggenheims' metals business, not a horizontal trust like Standard Oil.

79 posted on 12/12/2001 6:24:31 AM PST by The_Reader_David
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
a malicious Web site could "relatively easily and unnoticeably ... spread virii

It's bad enough when the geeks start making up words, but when the "journalists" start printing their silly improper slang as if it were correct, it drives me nuts.

92 posted on 12/12/2001 6:56:10 AM PST by Atlas Sneezed
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
HUGE security hole # 9312 of ?

MICROSOFT SSSUUUCCCKKKSSS!!!!!!

106 posted on 12/12/2001 7:56:52 AM PST by Silvertip
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
2001-11-26

Security Note: File extensions spoofable in MSIE download dialog

OVERVIEW

Oy Online Solutions Ltd's security experts have found a flaw in Microsoft Internet Explorer that allows a malicious website to spoof file extensions in the download dialog to make an executable program file look like a text, image, audio, or any other file. If the user chooses to open the file from its current location, the executable program will be run, circumventing Security Warning dialogs, and the attacker could gain control over the user's system.

A piece of HTML can be used to cause a normal download dialog to pop up. The dialog would prompt the user to choose whether he/she wants to "open this file from its current location" or "save this file to disk". The file name and extension may be anything the malicious website administrator (or a user having access there) wishes, e.g. README.TXT, index.html, or sample.wav. If the user chooses the first alternative, "open the file from its current location", an .EXE application is actually run without any further dialogs. This happens even if downloading a normal .EXE file from the server causes a Security Warning dialog.

The user has no way of detecting that the file is really an .EXE program and not a text, html, or other harmless file. The program could quietly backdoor or infect the user's system, and then pop up a window which does what the user expected, ie. show a text document or play an audio file.

No active scripting is necessary in order to exploit the flaw. The malicious website can be refered e.g. in an iframe, in a normal link, or by javascript.

DETAILS

The flaw is in the way Internet Explorer processes certain kind of URLs and HTTP headers. No further technical details are disclosed this time, as there is no proper workaround and the vulnerability could be relatively easily and unnoticeably exploited to spread virii, install DDoS zombies or backdoors, format harddisks, and so on.

The flaw has been successfully exploited with Internet Explorer 5.5 and 6. An IE5 with the latest updates shows the spoofed file name and extension without a sign of EXE, and issue no Security Warning dialog after the file download dialog.

Internet Explorer 6 is exploitable in a slightly different way, but the effect is the same. The user gets a download dialog with the spoofed file name and extension, and can choose between "Open" and "Save". Opening the file causes the program to be run.

Older versions such as IE5.0 behave somewhat differently. The dialog indicates the user is about to execute an application; the dialog has the word "execute" instead of "open", and a Security Warning dialog appears after choosing "execute". It still shows the spoofed file name and extension instead of "EXE".

Any way to skip all dialogs, ie. to run an application without ANY dialog with this vulnerability has NOT been found. In all variations of the exploit there is always the normal file download dialog, but the following Security Warning dialog is skipped.

Technical details of the vulnerability will be revealed later.

WORKAROUNDS

Opening a file type previously considered safe, e.g. plain text or HTML file isn't safe with IE. Users of the browser should avoid opening files directly and save them to disk instead (if opening them is necessary at all). If this flaw is being exploited, the file save dialog will reveal that the file is actually an executable program. Dealing with files from an untrusted source isn't advisable anyway. Another workaround is switching to another browser such as Opera or Netscape which don't seem to have this vulnerability.

VENDOR STATUS

Microsoft was contacted on November 19th. The company doesn't currently consider this is a vulnerability; they say that the trust decision should be based on the file source and not type. The origin of the file, ie. the web server's hostname can't be spoofed with this flaw. It's not known whether a patch is going to be produced. Microsoft is currently investigating the issue.

107 posted on 12/12/2001 8:02:44 AM PST by wooly_mammoth
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Microsoft has become completely fixated with gaining access and control of every personal computer, and mainly pushing advertising into non suspecting users. The world must break the dependence on Microsoft, before that company drives us all nuts.

Every fix-it patch creates major disruption to my computer.

115 posted on 12/12/2001 8:40:04 AM PST by imperator2
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Better yet, get a Mac!

I just spent two days helping a neighbor get her "plug it in and it works" IMAC, with MAC OS 9.x, to do the most basic of things, such as printing to her Hewlett Packard inkjet printer. Someone had put Netscape on it, and printing from Netscape scrambled the HP drivers. The only way I could get it to work was to remove Netscape and go with Microsoft's Internet Explorer.

MAC OS, through the 9-series (not including NeXSTEP/OPENSTEP/Rhapsody/OSX), is quite possibly the WORST operating system and graphical user interface ever conceived by the mind of man. How do you explain to a little old lady that there is a layer of abstraction between an application and a window, so that closing a window does NOT close the underlying application? If you close a window in MAC 9.x, without closing the underlying application, you can't get a new window for the application without forcing one open, via e.g. the keyboard shortcut CMD-n.

If a user double clicks an icon on the desktop to launch, say, a web browser, closes the window of the web browser, then double clicks the icon again, NOTHING HAPPENS!!! The user has to hit CMD-n to force open a new window! This is insane! What's worse, if the user doesn't double click the icon the second time, but only single clicks it (MANY users can't click fast enough to get a good double click) and hits CMD-n, then instead of getting a new window for the web browser, the user gets a new empty folder on the desktop (because the single click, in place of the double click, highlighted the desktop, NOT the icon)!!!

MAC OS 9.x is utter and complete garbage.

[And MAC users are real idiots. I once spent a whole morning on an emergency service call because a user couldn't find one of her applications. Turns out she had dragged a folder inside of itself - so the application was one layer deep than normal.]

122 posted on 12/12/2001 9:07:08 AM PST by SlickWillard
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Let's think about this, IE, IIS, and Outlook have had/have massive problems with virii/trojans/worms/etc.

The logical thing would to switch to Netscape, Apache, and use Eudora or Pegasus e-mail cliehts.

But are people going to do that? Nope, they are going to keep complaining everytime they get hacked or have something destroyed, because like the good sheeple they are, they will keep coming back to MS.

If people left in droves, I guarantee MS would start taking security and bugs a little more serious.

146 posted on 12/12/2001 10:16:13 AM PST by texlok
[ Post Reply | Private Reply | To 1 | View Replies ]

To: toupsie
Mac users of Microsoft Internet Explorer are not affected by this massive security hole. Windows users might want to switch to Netscape, Mozilla or Opera. Better yet, get a Mac! Or you could save your investment in Intel hardware and go with Linux

Certain groups are now placing Usenet postings which are actually self extracting executables. When downloaded in any IE greater than 4.0, the program executes in two parts...one, the harmless HTML based page the user expects, and Secondly, executes a back door Trojan.

Obviously a problem.

We have six year old ACER with such limited resourses that it will only take IE 4.0...and the warning box about Downloading an executable file and asking if you want to download it to, say a ZIP [tm] Disk for virus analysis, pops up every time!!

On our other machines, IE 5.0+ is installed, and Norton Antivirus has Quarantined a bunch of them.

I am rapidly becoming disaffected with Microsoft products...BUT, IMHO, LINUX isn't ready for Prime Time yet.

217 posted on 12/12/2001 12:03:42 PM PST by Lael
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson