[Esa-l] Yet ANOTHER Microsoft Active Scripting hole
Brett Glass
brett at lariat.org
Fri Apr 20 08:18:05 PDT 2001
According to Georgi Guninski, users of Outlook Express who have turned
off Active Scripting are STILL subject to exploitation by malicious
scripts that employ XML scripting. See
http://www.guninski.com/iexslt.html
for an example. It looks as if attachments with .eml, .xsl, and .xml
extensions should be mangled, defanged, or even poisoned.... IFRAME tags
are already disabled by John's santizier if they appear in the body of
the message, but not if they're in .eml files.
--Brett
More information about the esd-l
mailing list