[Esd-l] Outlook 2003 exploit using active scripting.

Smart,Dan SmartD at VMCMAIL.com
Thu May 20 08:48:46 PDT 2004


 I'm not mangling html files, but I have NOT set SECURITY_TRUST_HTML.  So I
take it this takes care of this vulnerability?

<<Dan>>

| -----Original Message-----
| From: John D. Hardin [mailto:jhardin at impsec.org] 
| Sent: Thursday, May 20, 2004 8:39 AM
| It uses an "embedded OLE object" so it sounds like it should 
| be defanged unless you have set SECURITY_TRUST_HTML, but 
| without seeing a sample I can't be sure.
| 
| Also, HTML file attachments are considered executable by 
| default and will be mangled.


More information about the esd-l mailing list