If you are running Firefox, Thunderbird or Mozilla under Windows, you need this patch right away or you will still be vulnerable to remote exploit. Users of other operating systems are not affected; the vulnerability is in Windows, but Firefox has been patched to work around it.
If you have just gone through the inconvenience of installing Firefox because of the vulnerability in IE, my heart goes out to you. I hope you'll take comfort in the fact that a fix for this problem is already available in Firefox and Mozilla (within a day of the exploit being published), while it seems there is still no effective fix for the problem in IE, so you still made the right choice.
If you have just gone through the inconvenience of installing Firefox because of the vulnerability in IE, my heart goes out to you. I hope you'll take comfort in the fact that a fix for this problem is already available in Firefox and Mozilla (within a day of the exploit being published), while it seems there is still no effective fix for the problem in IE, so you still made the right choice.
Help!
Date: 2004-07-11 04:21 am (UTC)Re: Help!
Date: 2004-07-11 04:46 am (UTC)Did you get my reply to your mail, BTW? I've had a slight hold-up in that I can't find my CD-ROM drive for my laptop...
Re: Help!
Date: 2004-07-11 05:37 am (UTC)Now I have to decide whether to upgrade to the latest version...
Re: Help!
Date: 2004-07-11 05:07 am (UTC)no subject
Date: 2004-07-11 04:22 am (UTC)Ignoring, of course, the fact that I had to manually reconfigure windows update and install a 100-MB Service Pack to 'fix' it in IE, and could only do so for IEv6 on the XP box.
no subject
Date: 2004-07-11 05:22 am (UTC)And it was out within a day of disclosure. MS still haven't completely fixed IE.
no subject
Date: 2004-07-11 05:36 am (UTC)no subject
Date: 2004-07-11 05:41 am (UTC)no subject
Date: 2004-07-11 07:14 am (UTC)no subject
Date: 2004-07-11 05:51 am (UTC)Admittedly it's all of 6 mouseclicks if you count the restart.
no subject
Date: 2004-07-11 05:15 am (UTC)no subject
Date: 2004-07-11 05:17 am (UTC)no subject
Date: 2004-07-11 08:54 am (UTC)no subject
Date: 2004-07-11 04:53 pm (UTC)no subject
Date: 2004-07-12 04:09 am (UTC)However, some things seem to be much safer than others - not just less often attacked, but actually less likely to yield to attack. Apache is vastly more popular than IIS, but crackers are still relying on IIS holes to propogate their malware; this is at least in part because your average Apache web server is actually more secure against such attacks than its IIS counterpart.
no subject
Date: 2004-07-11 05:33 am (UTC)mayeb this'll make some people feel better *grin*
Date: 2004-07-11 05:53 am (UTC)Re: mayeb this'll make some people feel better *grin*
Date: 2004-07-11 06:17 am (UTC)I think there's definitely an argument here for not allowing any protocol i) you don't fully understand or control the consequences of using, or ii) the user hasn't specifically enabled.
(A base set of http:, https:, ftp:, mailto:, news:, file: and javascript: ought to be enough for 99% of users.)
Re: mayeb this'll make some people feel better *grin*
Date: 2004-07-11 06:49 am (UTC)installing an inernal stub handler for 'shell:' is technically bad, but definately the right thing to do.
Re: mayeb this'll make some people feel better *grin*
Date: 2004-07-11 07:05 am (UTC)To deny its existence (which would have to be done by disallowing any extensibility in the protocol handler namespace - anyone can create a new protocol handler which could potentially also be abused) is not a practical option because it limits legitimate implementation of valuable functionality.
The key is ensuring that powerful features like this operate with very strict security restrictions, and/or are available only to callers that are trusted. Clearly this has not been done.
Re: mayeb this'll make some people feel better *grin*
Date: 2004-07-12 04:26 am (UTC)no subject
Date: 2004-07-11 06:38 am (UTC)no subject
Date: 2004-07-11 07:42 am (UTC)Soph x
no subject
Date: 2004-07-11 11:35 am (UTC)