Mozilla Bug

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Rowan Smith
Date:  
Subject: Mozilla Bug
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta http-equiv="Content-Type" content="text/html;charset=ISO-8859-1">
  <title></title>
</head>
<body text="#000000" bgcolor="#ffffff">
Doesn't that mean that it isn't vulnerable?<br>
<br>
rowan<br>
<br>
Dartagnon wrote:<br>
<blockquote type="cite" cite="mid3FDA4850.00001B.01016@minimark">
  <meta name="GENERATOR" content="IncrediMail 1.0">
  <table border="0" width="100%" cellpadding="2" cellspacing="0"
 id="INCREDIMAINTABLE">
    <tbody>
      <tr>
        <td width="100%"
 style="font-size: 12pt; cursor: auto; font-family: Arial;"
 id="INCREDITEXTREGION">
        <div>Mozilla 1.5 is vulnerable. The url reads:</div>
        <div><a href="http://www.microsoft.com%01%00@secunia/">http://www.microsoft.com%01%00@secunia</a></div>
        <div>com/internet_explorer_address_bar_spoofing_test/</div>
        <div>&nbsp;</div>
        <div>PS&nbsp;&nbsp;Sorry about my last e-mail which had full-blown html
&amp; pictures.&nbsp;&nbsp;On my</div>
        <div>laptop at work I use Incredimail and forgot to switch it
to plain text</div>
        <div>before I sent the message.</div>
        <div>That cute dachshund looks almost just like mine.</div>
        <div>Dart</div>
        <div>&nbsp;</div>
        <div>-------Original Message-------</div>
        <div>&nbsp;</div>
        <div>From: <a
 href="mailto:plug-discuss@lists.plug.phoenix.az.us"></a></div>
        <div>Date: 12/12/2003 01:38:56 PM</div>
        <div>To: <a href="mailto:plug-discuss@lists.plug.phoenix.az.us"></a></div>
        <div>Subject: Re: Mozilla Bug</div>
        <div>&nbsp;</div>
        <div><a href="mailto:frankburton@cox.net"></a>
wrote:</div>
        <div>&nbsp;</div>
        <div>&gt; I guess the new Internet explorer exploit discovered
earlier this week</div>
        <div>also affects Mozilla. I found this site which will test
your browser and</div>
        <div>tell you if you are affected.</div>
        <div>&gt; <a href="http://www.microsoft.com%01%00@secunia/">http://www.microsoft.com%01%00@secunia</a></div>
        <div>com/internet_explorer_address_bar_spoofing_test/</div>
        <div>&gt; I am running FireBird 0.7 and I am affected.</div>
        <div>&gt; Just thought you might want to know.</div>
        <div>&nbsp;</div>
        <div>mozilla 1.4 isn't vulnerable as I see the whole url and
not just microsoft</div>
        <div>com.</div>
        <div>&nbsp;</div>
        <div>---------------------------------------------------</div>
        <div>PLUG-discuss mailing list - <a
 href="mailto:PLUG-discuss@lists.plug.phoenix.az.us"></a></div>
        <div>To subscribe, unsubscribe, or to change you mail settings:</div>
        <div><a
 href="http://lists.plug.phoenix.az.us/mailman/listinfo/plug-discus">http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discus</a></div>
        </td>
      </tr>
      <tr>
        <td width="100%" id="INCREDIFOOTER">
        <table width="100%" cellpadding="0" cellspacing="0">
          <tbody>
            <tr>
              <td width="100%"><br>
              </td>
              <td align="middle" valign="bottom" id="INCREDISOUND"><br>
              </td>
              <td align="middle" valign="bottom" id="INCREDIANIM"><br>
              </td>
            </tr>
          </tbody>
        </table>
        </td>
      </tr>
    </tbody>
  </table>
</blockquote>
<br>
</body>
</html>