Profile

kyrielle: painterly drawing of a white woman with large dark-blue-framed glasses, hazel eyes, brown hair, and a suspicious lack of blemishes (Default)
Laura

Most Popular Tags

Style Credit

Tuesday, November 19th, 2002 08:53 am
Another vulnerability, courtesy of IE under Windows. 'Magine that.

http://www.wired.com/news/infostructure/0,1377,56463,00.html

This one's actually interesting enough to get me to fight with my security settings, even.
Tuesday, November 19th, 2002 09:55 am (UTC)
Wow... that's a good one! I'm not really surprised though.
Tuesday, November 19th, 2002 11:15 am (UTC)
I thought the workaround was to disable scripting in general, then turn it back on for those sites where you need it (and trust them). I don't see that as doable in a firewall. Or did I misread the article? See http://www.jmu.edu/computing/security/info/iehot.shtml

I could have missed something, since I didn't read it in great detail, since I don't run IE, Outlook or Outlook Express. Ever.
Tuesday, November 19th, 2002 03:48 pm (UTC)
Yeah, but.... Unless you are running ZoneAlarm Pro and it does more things than I think it does, ZoneAlarm provides some inbound firewall protection, but for outbound control it does it by application. And you have to have IE in the accepted list which still allows the bad HTML and scripting to come in.