('binary' encoding is not supported, stored as-is) SPAM: -------------------- Start SpamAssassin results ---------------------- SPAM: This mail is probably spam. The original message has been altered SPAM: so you can recognise or block similar unwanted mail in future. SPAM: See http://spamassassin.org/tag/ for more details. SPAM: SPAM: Content analysis details: (5 hits, 5 required) SPAM: Hit! (1.2 points) From: does not include a real name SPAM: Hit! (3 points) Listed in Razor, see http://razor.sourceforge.net/ SPAM: Hit! (0.8 points) Forged hotmail.com 'Received:' header found SPAM: SPAM: -------------------- End of SpamAssassin results --------------------- When i read George Guninski's article (on his site) about the getobject vulnerability, I wondered how feasible it would be to actually open a temp. internet file... Guess what? It can be done fairly simply. This doesn't seem too bad at first, but because most major webmail msgs are stored in temp. internet files, this causes a pretty vast security glitch. Instead of snitching cookies, somebody can perhaps also read mail that you've already deleted... Not good... Here's some (still somewhat buggy) proof of concept code... for ie6 www.geocities.com/freedatarecovery/hr6.html for ie4 www.geocities.com/freedatarecovery/hr4.html Notes: when prompted, type in getmsg for the dosname (that's the file hotmail uses) or ShowLe for yahoo Many error msgs are going to come up, because this just stabs in the dark to find a msg. Comments, questions? email freewarecollectorat_private +jestar
This archive was generated by hypermail 2b30 : Mon Feb 25 2002 - 15:35:49 PST