[Esd-l] FW: [BT] NOT GOOD: Outlook Express 6 + Internet Explorer 6

Joe Steele joe at madewell.com
Wed Mar 31 20:34:55 PST 2004


Does anyone else find this troubling?

http://www.securityfocus.com/archive/1/359139

This details a method for delivering hazardous e-mail content in a 
way that would not be trapped by the sanitizer.

It looks pretty slick to me.  The recipient is presented with a 
harmless looking message and is tricked into clicking on what looks 
to be an innocent link.

As for defending against this, I think defanging <FORM> tags might be 
appropriate. (IMHO, I can think of no good reason why I need to 
receive an html form by e-mail anyway.)  Consequently, I created the 
attached patch against 1.142 which adds <FORM> tags to the list of 
html tags that are defanged (presuming SECURITY_TRUST_HTML is 
undefined).  Comments/opinions?

--Joe

[demime 0.98e removed an attachment of type application/octet-stream which had a name of 1.142.patch]


More information about the esd-l mailing list