[Am-info] Windows in trouble for any html use!

John J. Urbaniak jjurban@attglobal.net
Tue, 13 Jul 2004 11:28:14 -0400


It's time for an all-out condemnation of the PC Press.  Back during the 
OS/Wars, the Press undeniably took the side of Microsoft.  They all but 
wiped out my small business, because my software is OS/2 - (now eCS-) based.

If a significant number of computers were based on systems other than 
Microsoft, we would not be in these straits today.  If we had a 
significant percentage of OS/2, Apple, Linux and other operating systems 
in use, the odds of viruses propagating throughout our entire computing 
infrastructure would be drastically reduced.

By allowing themselves to be co-opted by the Gang of Criminals from 
Redmond,  the Press is totally responsible for the sorry state we are in 
today.

John




Gene Gaines wrote:

> The U.S. Department of Homeland Security has notified the world
> to stop using the Web browser, and in fact generally stop using
> Windows to view any HTML documents.
>
> Hopefully, if you use Microsoft Internet Explorer or Microsoft
> Outlook, you know about this problem and have taken steps to
> guard your computer.  If not, it is time to panic and read this
> now.
>
> If you are lucky (or wise) enough NOT to use the above, this
> report is fascinating and worth taking time to read carefully.
>
> See: http://www.kb.cert.org/vuls/id/713878
>
> This warning is by US-CERT, the United States Computer Emergency
> Readiness Team, part of the U.S. Department of Homeland
> Security.
>
> I'll attempt a short description:
>
>    By convincing a victim to view an HTML document (web page,
>    HTML email), an attacker could execute script in a different
>    security domain than the one containing the attacker's
>    document. By causing script to be run in the Local Machine
>    Zone, the attacker could execute arbitrary code with the
>    privileges of the user running IE.
>
>    By redirecting to a local resource, controlling the timing of
>    the redirect, and setting the frame's location to a
>    javascript: protocol URI, an attacker can execute script in
>    the security context of the Local Machine Zone.
>
>    Functional exploit code is publicly available, and there are
>    reports of incidents involving this vulnerability.
>
>    Any program that hosts the WebBrowser ActiveX control or used
>    the IE HTML rendering engine (MSHTML) may be affected by this
>    vulnerability.
>
> Seems to me, then, run any of the many Windows-based applications
> that make use of the IE HTML rendering engine and you're running
> down the street with no pants on.  That includes HTML emails.
>
> So, the answer is to follow no hot-links and view no email unless
> you are sure of the source.
>
> Hey, the AM-INFO list should be safe because we use ASCII.
>
> Are you sure this email does not contain HTML?
>
> I again invite you to visit: http://www.kb.cert.org/vuls/id/713878
>
> But, if you visited the above site, are you SURE that site is not a
> fake and your computer may have been compromised. 
>
> Are you sure this email was sent by Gene Gaines?
>
> Are you sure one of the HTML emails you read this week was not an
> exploit?
>
> I'm glad I use Mozilla and The Bat!
>
> /Gene Gaines
> gene.gaines@gainesgroup.com
> Sterling, Virginia/