Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft Internet Explorer "window()" Denial of Service Weakness
secunia.org ^

Posted on 05/31/2005 1:21:56 PM PDT by frogjerk

Benjamin Tobias Franz has discovered a weakness in Internet Explorer, which can be exploited by malicious people to cause a DoS (Denial of Service).

The problem is caused due to certain objects not being initialized correctly. This can be exploited to crash a vulnerable browser via some specially crafted JavaScript code called directly when a site has been loaded.

NOTE: It is currently not believed that this issue can be exploited for code execution purposes, but this cannot be ruled out completely.

(Excerpt) Read more at secunia.com ...


TOPICS: News/Current Events
KEYWORDS: getfirefox; microshaft
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-102 next last
To: since1868

There are a few places on the net where you can get free spyware removal. I used it when I switched to firefox. I haven't had much of a problem since.


21 posted on 05/31/2005 3:07:38 PM PDT by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 18 | View Replies]

To: pbrown
I use Spyware S and D
I run a scan 5 things are detected run remove all destroyed
immediately run a scan and the 5 are back.
22 posted on 05/31/2005 3:10:09 PM PDT by since1868
[ Post Reply | Private Reply | To 21 | View Replies]

To: SengirV

ummm most of the issues are with activeX not java..


23 posted on 05/31/2005 3:10:57 PM PDT by N3WBI3
[ Post Reply | Private Reply | To 10 | View Replies]

To: since1868
Try some of this. It might help you, it did me.

link to info

24 posted on 05/31/2005 3:14:36 PM PDT by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 18 | View Replies]

To: since1868
mmediately run a scan and the 5 are back.

Outta my league, but there are many here who could help you. FReepers are great people that way, they help you when they can.

25 posted on 05/31/2005 3:16:37 PM PDT by processing please hold (Islam and Christianity do not mix ----9-11 taught us that)
[ Post Reply | Private Reply | To 22 | View Replies]

To: frogjerk
Why wasn't the vendor privately notified and given an opportunity to release a patch? These guys that openly release exploits on the internet are the bigger problem, because as we all should know, all software has security vulnerabilities.
26 posted on 05/31/2005 3:38:12 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 1 | View Replies]

To: pbrown

Thanks I tried adaware I will let you know.


27 posted on 05/31/2005 3:41:44 PM PDT by since1868
[ Post Reply | Private Reply | To 24 | View Replies]

To: frogjerk

"Denial of Service"


I'm not quite sure how a crash of IE relates to a DoS.


28 posted on 05/31/2005 4:17:11 PM PDT by shellshocked (They're undocumented Border Patrol agents, not vigilantes.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wacka

"Who is still stupid enough to use IE on ANY platform?"


People who are not also stupid enough to believe the hype that Linux or Firefox are perfect.


29 posted on 05/31/2005 4:18:37 PM PDT by shellshocked (They're undocumented Border Patrol agents, not vigilantes.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: pillbox_girl

"daily occurances of explorer crashing?"



If your IE is crashing daily, you must be doing something wrong. I've NEVER had IE crash daily, and I don't know of anyone who has.


30 posted on 05/31/2005 4:19:54 PM PDT by shellshocked (They're undocumented Border Patrol agents, not vigilantes.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: frogjerk

Big deal. Close the app. Don't go back to that site. Problem solved.


31 posted on 05/31/2005 4:24:07 PM PDT by Bush2000 (Linux -- You Get What You Pay For ... (tm)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle
Why wasn't the vendor privately notified and given an opportunity to release a patch? These guys that openly release exploits on the internet are the bigger problem, because as we all should know, all software has security vulnerabilities.

Security through obscurity is not a great way to deal with software bugs. Better to publish the problem to make everyone aware of the issue and get everyone working to fix it.

Covering it up isn't going to fix the issues in software. Microsoft is a prime example of the failure of that methodology.

32 posted on 06/01/2005 6:15:13 AM PDT by frogjerk
[ Post Reply | Private Reply | To 26 | View Replies]

To: since1868
immediately run a scan and the 5 are back.

DSO Exploit, right?

Go to Settings, open the Security Tab, and check the DSO Exploits box. Those five things are not truly exploits, but they show up as baddies. This check box will allow S&D to ignore them.

33 posted on 06/01/2005 6:20:53 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 22 | View Replies]

To: ShadowAce

You are right about the DSO
Why I think I have spyware is my cursor moves by itself
across my screen


34 posted on 06/01/2005 6:25:06 AM PDT by since1868
[ Post Reply | Private Reply | To 33 | View Replies]

To: since1868

That's weird. I haven't heard of a virus that does that. But then, I don't follow the latest virii all that closely, as I never get them.


35 posted on 06/01/2005 8:13:58 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 34 | View Replies]

To: frogjerk
Security through obscurity is not a great way to deal with software bugs.

It is one valid level of protection, even Linus Torvalds admits it. It makes no sense not to notify the patch creators before you notify the exploit creators.

Covering it up isn't going to fix the issues in software.

No but it will provide the patch creators a chance to develop the patch before the exploits are created. Many of these supposed "researchers" release open source exploit code onto the internet before patch creation even begins, which is what you are supporting.

36 posted on 06/01/2005 9:42:32 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 32 | View Replies]

To: Golden Eagle
No but it will provide the patch creators a chance to develop the patch before the exploits are created. Many of these supposed "researchers" release open source exploit code onto the internet before patch creation even begins, which is what you are supporting.

I support peer review which the closed-source (eg. Microsoft) community does not.

37 posted on 06/01/2005 9:48:16 AM PDT by frogjerk
[ Post Reply | Private Reply | To 36 | View Replies]

To: ShadowAce
Whats weird is this has been going on with 3 computers and several mice. No knows why
38 posted on 06/01/2005 9:52:10 AM PDT by since1868
[ Post Reply | Private Reply | To 35 | View Replies]

To: frogjerk

You obviously support those that post exploits prior to the vendor having an opportunity to create a patch. You created this very thread which does exactly that.


39 posted on 06/01/2005 10:20:49 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 37 | View Replies]

To: Golden Eagle
You obviously support those that post exploits prior to the vendor having an opportunity to create a patch. You created this very thread which does exactly that.

The vendors need to get off their a**es and fix their code.

40 posted on 06/01/2005 11:10:26 AM PDT by frogjerk
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-102 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson