06.12.2010 Sicherheitslücke im Internet Explorers Protected Mode
Sorry, most articles are not available in English yet

06.12.2010: Auch im Protected Mode ist ein Exploit möglich

Researchers from Verizon Business have now described a way of bypassing Protected Mode in IE 7 and 8 in order to gain access to user accounts. By calling the IELaunchURL() function, an attacker can instruct IE to load a URL from this web server, for instance "http://localhost/exploit.html". Localhost is generally part of IE's Local Intranet Zone and, by default, Protected Mode is disabled for content from this zone.

Mehr dazu bei http://www.h-online.com/security/news/item/Internet-Explorer-s-Protected-Mode-can-be-bypassed-1147562.html

Alle Artikel zu


Category[21]: Unsere Themen in der Presse Short-Link to this page: a-fsa.de/e/1v7
Link to this page: https://www.aktion-freiheitstattangst.org/de/articles/1731-20101206-sicherheitsluecke-im-internet-explorers-protected-mode.htm
Link with Tor: http://a6pdp5vmmw4zm5tifrc3qo2pyz7mvnk4zzimpesnckvzinubzmioddad.onion/de/articles/1731-20101206-sicherheitsluecke-im-internet-explorers-protected-mode.htm
Tags: #Datensicherheit #Microsoft #Datenschutz #Hack #ie #browser #Ergonomie #Verbraucherdatenschutz
Created: 2010-12-06 08:11:17


Kommentar abgeben

For further confidential communication, we recommend that you include a reference to a secure messenger, such as Session, Bitmessage, or similar, below the comment text.
To prevent the use of this form by spam robots, please enter the portrayed character set in the left picture below into the right field.

We in the Web2.0


Diaspora Mastodon Twitter Youtube Tumblr Flickr FsA Wikipedia Facebook Bitmessage FsA Song


Impressum  Privacy  Sitemap