Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Second flaw in IE7 ... is it really a flaw?

Second flaw in IE7 ... is it really a flaw?

Scheduled Pinned Locked Moved The Lounge
helphtmlcomadobetutorial
38 Posts 12 Posters 3 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Gary Wheeler

    You can lead a horse to water; if he doesn't drink, shoot him. Hopefully, you won't run out of horses.


    Software Zen: delete this;

    C Offline
    C Offline
    Christopher Duncan
    wrote on last edited by
    #9

    You can lead a horse to water, but if you can get him to walk on it you have a whole new ball game.

    Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

    G 1 Reply Last reply
    0
    • S Stephane Rodriguez

      I have found a far worse flaw. You can alter the RSS store without being seen. Details on my blog. The IE team could have added a checksum to avoid that, but they chose not to. I hope they get fired.

      C Offline
      C Offline
      Christopher Duncan
      wrote on last edited by
      #10

      I hope the people who employ you don't have a similar draconian policy. :)

      Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

      S 1 Reply Last reply
      0
      • S Stephane Rodriguez

        What you seem to forget (or fail to know) is that those responsible for IE7 are the old IE guys, whose team has been rebuilt. So it's a matter of getting rid of dead horses.

        C Offline
        C Offline
        Christopher Duncan
        wrote on last edited by
        #11

        Mmmmm. Elmers...

        Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

        1 Reply Last reply
        0
        • C Christopher Duncan

          You can lead a horse to water, but if you can get him to walk on it you have a whole new ball game.

          Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

          G Offline
          G Offline
          Gary Wheeler
          wrote on last edited by
          #12

          Minnesota in January; no sweat (literally). After all, you didn't specify what state the water was in. :laugh:


          Software Zen: delete this;

          C 1 Reply Last reply
          0
          • C Christopher Duncan

            I hope the people who employ you don't have a similar draconian policy. :)

            Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

            S Offline
            S Offline
            Stephane Rodriguez
            wrote on last edited by
            #13

            Don't worry, I am self-employed and fire myself from time to time ;) On a serious note though, when a team screws it by introducing new attack vectors, the best you can do is fire them. Or you are part of the problem. You like politics, don't you?

            C 1 Reply Last reply
            0
            • G Gary Wheeler

              Minnesota in January; no sweat (literally). After all, you didn't specify what state the water was in. :laugh:


              Software Zen: delete this;

              C Offline
              C Offline
              Christopher Duncan
              wrote on last edited by
              #14

              :laugh:

              Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

              1 Reply Last reply
              0
              • S Stephane Rodriguez

                Don't worry, I am self-employed and fire myself from time to time ;) On a serious note though, when a team screws it by introducing new attack vectors, the best you can do is fire them. Or you are part of the problem. You like politics, don't you?

                C Offline
                C Offline
                Christopher Duncan
                wrote on last edited by
                #15

                I detest politics, which is why I've spent so much time and energy showing other people how to cope with them. Seems to me that if you're looking for a scapegoat it would be either the QA team who missed this or the manager who failed to allocate a sufficient budget for testing.

                Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

                S 1 Reply Last reply
                0
                • C Christopher Duncan

                  I detest politics, which is why I've spent so much time and energy showing other people how to cope with them. Seems to me that if you're looking for a scapegoat it would be either the QA team who missed this or the manager who failed to allocate a sufficient budget for testing.

                  Author of The Career Programmer and Unite the Tribes www.PracticalStrategyConsulting.com

                  S Offline
                  S Offline
                  Stephane Rodriguez
                  wrote on last edited by
                  #16

                  Neither. Since BG announced the "trustworthy computing" initiative and the security threat models are mandatory part of every step of the dev cycle in Redmond, everyone in the team is responsible. Again, this is just bad : a data store without checksums. Even rookies don't make this mistake. IE is supposed to be used by hundred millions usersvictims.

                  1 Reply Last reply
                  0
                  • S Stephane Rodriguez

                    I have found a far worse flaw. You can alter the RSS store without being seen. Details on my blog. The IE team could have added a checksum to avoid that, but they chose not to. I hope they get fired.

                    M Offline
                    M Offline
                    Mike Dimmick
                    wrote on last edited by
                    #17

                    You mean this[^] link. Whoo, a program running under your credentials can modify a file in the RSS cache. Sorry, I really don't see that as a vulnerability. Also, you can only change a character. You can't arbitrarily add text as it screws up the file. I just tried overtyping a bunch of the HTML in a feed with a <script> tag which simply calls window.alert. It didn't run.

                    Stability. What an interesting concept. -- Chris Maunder

                    D B S 3 Replies Last reply
                    0
                    • D David Wulff

                      This was mentioned in the daily news e-mail. The flaw is described as: The bug allows hackers to place a fake Web address in one of the browser's pop-up Windows, and could be used to trick a victim into inadvertently downloading something from what appeared to be a trusted Web site. While the full URL of the Web page being displayed is present in the pop-up Window's address bar, the left part of this URL is not initially displayed, the [Secunia] spokesman said. Source: http://www.infoworld.com/article/06/10/25/HNie7flaw2_1.html[^] I've looked at their example, and can't see how this is unique to IE or really even a problem? Basically, by having a page on my site at:

                      'http://www.mysite.com/blah?http://www.codeproject.com/login.asp '

                      ...with some carefully appended white space at the end to scroll the address to the left, people may think they are on CodeProject.com. Only, in IE7 the address bar is selected by default (presumably to prevent this sort of thing) so the moment I try and do anything in the new window it will imediately flash up and tell me I am really on mysite.com/blah. It seems to me that Secunia is just trying to get in the news, even if they have to make up problems to do so?


                      Ðavid Wulff Die Freiheit spielt auf allen Geigen (video)
                        10 PRINT 'HELLO MAINTAINER: GOTO HELL

                      S Offline
                      S Offline
                      Sarath C
                      wrote on last edited by
                      #18

                      Why You are emphasizing on the flaws on IE? I think people are de-emphasize the flaws of firefox. before 2-3 weeks ago, as per Secunia's report IE has less flaws compared to firefox. See the news posted just 2 hours ago Mozilla downplays Firefox 2.0 bugs[^]

                      -Sarath_._ "Great hopes make everything great possible" - Benjamin Franklin

                      My blog - Sharing My Thoughts, An Article - Understanding Statepattern

                      D 1 Reply Last reply
                      0
                      • S Stephane Rodriguez

                        I have found a far worse flaw. You can alter the RSS store without being seen. Details on my blog. The IE team could have added a checksum to avoid that, but they chose not to. I hope they get fired.

                        S Offline
                        S Offline
                        Stephane Rodriguez
                        wrote on last edited by
                        #19

                        ...but please, don't use Internet Explorer.

                        D 1 Reply Last reply
                        0
                        • S Stephane Rodriguez

                          I have found a far worse flaw. You can alter the RSS store without being seen. Details on my blog. The IE team could have added a checksum to avoid that, but they chose not to. I hope they get fired.

                          A Offline
                          A Offline
                          Antony M Kancidrowski
                          wrote on last edited by
                          #20

                          I see you are trying to get a rise out of people in order to react to your posts. Well you got my attention as far as a reaction this is it.

                          Ant. I'm hard, yet soft.
                          I'm coloured, yet clear.
                          I'm fruity and sweet.
                          I'm jelly, what am I? Muse on it further, I shall return!
                          - David Walliams (Little Britain)

                          1 Reply Last reply
                          0
                          • S Sarath C

                            Why You are emphasizing on the flaws on IE? I think people are de-emphasize the flaws of firefox. before 2-3 weeks ago, as per Secunia's report IE has less flaws compared to firefox. See the news posted just 2 hours ago Mozilla downplays Firefox 2.0 bugs[^]

                            -Sarath_._ "Great hopes make everything great possible" - Benjamin Franklin

                            My blog - Sharing My Thoughts, An Article - Understanding Statepattern

                            D Offline
                            D Offline
                            David Wulff
                            wrote on last edited by
                            #21

                            Sarath. wrote:

                            Why You are emphasizing on the flaws on IE?

                            I'm not - I'm emphasising the fact they are calling a carefully created presentation issue a flaw, when in fact the moment you try and do anything with it it immediately tells you it is on a spoofed site. That is even when you ignore IE7's spoof site warnings, which would get picked up within hours of it going live. The so-called flaw can't even be used in the real world because it requires script to open the window of an exact size in order to work - something that no e-mail client will allow to run. The only way to launch such a window would be from the spoof web site itself, defeating the whole thing. (Again, ignoring the built-in spoof filter.)


                            Ðavid Wulff Die Freiheit spielt auf allen Geigen (video)
                              10 PRINT 'HELLO MAINTAINER: GOTO HELL

                            1 Reply Last reply
                            0
                            • M Mike Dimmick

                              You mean this[^] link. Whoo, a program running under your credentials can modify a file in the RSS cache. Sorry, I really don't see that as a vulnerability. Also, you can only change a character. You can't arbitrarily add text as it screws up the file. I just tried overtyping a bunch of the HTML in a feed with a <script> tag which simply calls window.alert. It didn't run.

                              Stability. What an interesting concept. -- Chris Maunder

                              D Offline
                              D Offline
                              David Wulff
                              wrote on last edited by
                              #22

                              I really love his comparison between Firefox and Microsoft Word, which ends with the suggestion that Word is no longer needed because FF2 ships with an English spell checker. If you can bare to read any further into his blog, make sure you are sitting firmly in your chair or you may just fall out of it laughing. My god, it is rare to see such blatent bias - even Jeremy doesn't go quite that far when Macs get brought up in the Lounge! ;P I particularly like the half page of writing bitching about IE7's search providers, simply because he couldn't be bothered to read the one line of instructions on how to use them. :rolleyes:


                              Ðavid Wulff Die Freiheit spielt auf allen Geigen (video)
                                10 PRINT 'HELLO MAINTAINER: GOTO HELL

                              S 2 Replies Last reply
                              0
                              • S Stephane Rodriguez

                                ...but please, don't use Internet Explorer.

                                D Offline
                                D Offline
                                David Wulff
                                wrote on last edited by
                                #23

                                I voted you a 1.0 on this message and the one where you mention criminals, because the content of those messages is utter drivel. And that is being polite to your other responses on this thread. Still, if it helps you to feel important, I promise not to waste time voting on future messages.


                                Ðavid Wulff Die Freiheit spielt auf allen Geigen (video)
                                  10 PRINT 'HELLO MAINTAINER: GOTO HELL

                                S 1 Reply Last reply
                                0
                                • M Mike Dimmick

                                  You mean this[^] link. Whoo, a program running under your credentials can modify a file in the RSS cache. Sorry, I really don't see that as a vulnerability. Also, you can only change a character. You can't arbitrarily add text as it screws up the file. I just tried overtyping a bunch of the HTML in a feed with a <script> tag which simply calls window.alert. It didn't run.

                                  Stability. What an interesting concept. -- Chris Maunder

                                  B Offline
                                  B Offline
                                  benjymous
                                  wrote on last edited by
                                  #24

                                  My god, I just hex-edited IE7's exe * and replaced it with the code of a virus, and now when I run it I've got a virus. Fire the lot of them, I say * Actually, I didn't

                                  -- Help me! I'm turning into a grapefruit! Buzzwords!

                                  S 1 Reply Last reply
                                  0
                                  • S Stephane Rodriguez

                                    I have found a far worse flaw. You can alter the RSS store without being seen. Details on my blog. The IE team could have added a checksum to avoid that, but they chose not to. I hope they get fired.

                                    J Offline
                                    J Offline
                                    Jerry Hammond
                                    wrote on last edited by
                                    #25

                                    Stephane Rodriguez. wrote:

                                    I hope they get fired.

                                    :sigh:

                                    "When I get a little money, I buy books and if any is left, I buy food and clothes." --Erasmus

                                    1 Reply Last reply
                                    0
                                    • S Stephane Rodriguez

                                      I have found a far worse flaw. You can alter the RSS store without being seen. Details on my blog. The IE team could have added a checksum to avoid that, but they chose not to. I hope they get fired.

                                      M Offline
                                      M Offline
                                      Matt Newman
                                      wrote on last edited by
                                      #26

                                      This is just like the Outlook bug where I can delete email I don't want to keep anymore. Come to think of it I can edit my Word files without any errors. And probably my Excel files and my PowerPoint presentations... The whole Office team should be fired. OMG I just tried changing my desktop background in Vista, and it let me... better fire the Vista team as well. Under even further research I discovered that I can change my code files without Visual Studio stopping me, and I encountered this bug on XP, 2003 Server AND Vista. I am begginning to believe the only way to keep my precious files safe from myself is to erase my harddrives... Everyone that has ever used a computer should be fired from their job! Seriously though altering the RSS Store is not a bug, its called editing files on your own computer. Furthermore the data store is documented in the Feeds API and is stored as such to allow for easy consumption by programs other than IE 7.

                                      Matt Newman
                                      Even the very best tools in the hands of an idiot will produce something of little or no value. - Chris Meech on Idiots

                                      1 Reply Last reply
                                      0
                                      • D David Wulff

                                        This was mentioned in the daily news e-mail. The flaw is described as: The bug allows hackers to place a fake Web address in one of the browser's pop-up Windows, and could be used to trick a victim into inadvertently downloading something from what appeared to be a trusted Web site. While the full URL of the Web page being displayed is present in the pop-up Window's address bar, the left part of this URL is not initially displayed, the [Secunia] spokesman said. Source: http://www.infoworld.com/article/06/10/25/HNie7flaw2_1.html[^] I've looked at their example, and can't see how this is unique to IE or really even a problem? Basically, by having a page on my site at:

                                        'http://www.mysite.com/blah?http://www.codeproject.com/login.asp '

                                        ...with some carefully appended white space at the end to scroll the address to the left, people may think they are on CodeProject.com. Only, in IE7 the address bar is selected by default (presumably to prevent this sort of thing) so the moment I try and do anything in the new window it will imediately flash up and tell me I am really on mysite.com/blah. It seems to me that Secunia is just trying to get in the news, even if they have to make up problems to do so?


                                        Ðavid Wulff Die Freiheit spielt auf allen Geigen (video)
                                          10 PRINT 'HELLO MAINTAINER: GOTO HELL

                                        S Offline
                                        S Offline
                                        Shog9 0
                                        wrote on last edited by
                                        #27

                                        On the one hand, i don't think it's a big deal. On the other hand, Microsoft probably did, seeing as how one of the obvious changes between IE6 and IE7 was to force an address bar into popups, for the single stated reason of making it harder to spoof legit windows. If it's too easy to spoof a URL, then that effectively negates the whole reason for it to exist - so yeah, it's a flaw. Even if i used IE7, this wouldn't be the sort of thing that'd have me worried at all, but i can at least see why it'd be reported as a flaw.

                                        every night, i kneel at the foot of my bed and thank the Great Overseeing Politicians for protecting my freedoms by reducing their number, as if they were deer in a state park. -- Chris Losinger, Online Poker Players?

                                        D 1 Reply Last reply
                                        0
                                        • M Mike Dimmick

                                          You mean this[^] link. Whoo, a program running under your credentials can modify a file in the RSS cache. Sorry, I really don't see that as a vulnerability. Also, you can only change a character. You can't arbitrarily add text as it screws up the file. I just tried overtyping a bunch of the HTML in a feed with a <script> tag which simply calls window.alert. It didn't run.

                                          Stability. What an interesting concept. -- Chris Maunder

                                          S Offline
                                          S Offline
                                          Stephane Rodriguez
                                          wrote on last edited by
                                          #28

                                          You don't see the vulnerability? Don't worry, keep using Internet Explorer... An example of nefarious purpose is to rewrite urls. Don't see what it can be used for?

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups