kyrielle: Middle-aged woman in profile, black and white, looking left, with a scarf around her neck and a white background (Default)
Laura ([personal profile] kyrielle) wrote2002-11-19 08:53 am

Gee, there's a cheery thought.

Another vulnerability, courtesy of IE under Windows. 'Magine that.

http://www.wired.com/news/infostructure/0,1377,56463,00.html

This one's actually interesting enough to get me to fight with my security settings, even.

[identity profile] canyoncat.livejournal.com 2002-11-19 09:55 am (UTC)(link)
Wow... that's a good one! I'm not really surprised though.

[identity profile] pheon.livejournal.com 2002-11-19 11:15 am (UTC)(link)
I thought the workaround was to disable scripting in general, then turn it back on for those sites where you need it (and trust them). I don't see that as doable in a firewall. Or did I misread the article? See http://www.jmu.edu/computing/security/info/iehot.shtml

I could have missed something, since I didn't read it in great detail, since I don't run IE, Outlook or Outlook Express. Ever.

[identity profile] pheon.livejournal.com 2002-11-19 03:48 pm (UTC)(link)
Yeah, but.... Unless you are running ZoneAlarm Pro and it does more things than I think it does, ZoneAlarm provides some inbound firewall protection, but for outbound control it does it by application. And you have to have IE in the accepted list which still allows the bad HTML and scripting to come in.