Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: IE5 Feature/security holeEilon Lipton (yoeMEDIAONE.NET)
Mon, 29 Mar 1999 15:41:00 -0500
- Messages sorted by: [ date ][ thread ][ subject ][ author ]
- Next message: Domas Mituzas: "XFree86 3.3.3 on RedHat 5.2. Why is RedHat waiting??"
- Previous message: sillyhead: "Re: XFree86 3.3.3 on RedHat 5.2. Why is RedHat waiting??"
- In reply to: Juha =?iso-8859-1?Q?J=E4ykk=E4?=: "Re: IE5 Feature/security hole"
This is getting a bit off-topic, but anybody who is *that* concerned with the privacy of what they type in their e-mail has two options: 1. Disable the feature in the Options 2. Keep the workstation locked when not present at it All the main Internet settings, including all the Intelli-whatever stuff are stored in HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main There is also a key there, HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\SPW Which has stuff in it such as: "7* U0D7O=9FN+4 = 0x00000000 (0) .[JYB C-HQN6EYE = 0x00000000 (0) And several more. These appear to be encrypted, but do not ask me how. I have 14 such oddly-named keys in my registry and I have used this feature quite a lot (since the betas of IE5). It would be interesting if anybody could find out how these are encrypted given the data that was encrypted and its encrypted result. Anyway, part of my point is that an administrator that is really worried about his NT system can write a teeny little program that disabled all these features and even denies user the right to modify these settings via the registry's security settings. The other part is that a user on his/her own can protect themselves by simply disabling this option (same as with the Netscape's "What's related" thingo, which is also now a feature in IE5, made by the same people, methinks). The other other part of my point is that some John Doe cannot just steal the stored stuff because as you see above that is nowhere near plaintext. Eilon Lipton yoemediaone.net > -----Original Message----- > From: Bugtraq List [mailto:BUGTRAQnetspace.org]On Behalf Of Juha Jäykkä > Sent: Monday, March 29, 1999 1:45 AM > To: BUGTRAQnetspace.org > Subject: Re: IE5 Feature/security hole > > > > According to Microsoft, the database (call it what you like) > where all this > > information is stored is encrypted, so you cannot just go to a random > > machine and grab all the data - you must go to a form that has > the proper > > field names in order to get the information. > > Blast it! Where does the pass phrase come from? Does IE5 ask the user > for encryption password when this autofill feature is first used? Does > IE5 ask the user for decryption password every time this feature is used > during different sessions? (By session I mean running a program and > shutting it down. The important thing here is it thus effectively erases > any memory cache it might have been using - if it remembered the > password (as programs NEVER must)...) If you answered "no" to any of the > above, then the password is stored somewhere and it can be retrieved and > the "secure" encrypted storage decrypted by anyone who has access to the > machine. This brings us back to square one: anyone with access to your > IE5 has access to anything you have ever typed in any form. > By the way: where exactly are the entries stored? Are they secured > with proper NTFS permissions or are they just left somewhere in > %SystemRoot% with Everyone:F permissions so every user would use the > same file or does every user have a distinct file (not that this would > help with non-NT windows)? > I just wonder, when will we see security in MS products, other than > NT? I'm becoming really worried... now that NT5 is renamed, I'd not be > surprised if security had been also lost with the name... > > -- > Juha Jäykkä, juhajiki.fi >