mailing list archives
Re: Fwd: CERT Advisory CA-2000-02
From: fury () NEXXUS NET (fury)
Date: Thu, 3 Feb 2000 12:04:53 -0800
On Thu, 3 Feb 2000 Shockro () AOL COM wrote:
I'm curious as to how this could be used in a malicious manner, as opposed to
just being an annoyance. I mean, god forbid, people should execute arbitrary
1001 ways to crash Internet Explorer through infinite loops, but there's
nothing seriously harmful about this, am I right? Please correct me if I'm
The SSL scenario is the most interesting point for me. Let us assume you
are buying something from amazon.com using your credit card. You fill out
all the forms and click on submit.
Malicious code in this example would send your POST request to the
intended secure server, but also could send another POST to a different
server. If the second server is not SSL capable, a warning dialogue would
be brought up. But if it is SSL capable, an unsuspecting user would never
Other problems, which are probably nuisances, is that malicious code can
obtain readable attributes and variables available in the browser object (
As far as non secure methods of communicating, since you are throwing
you info out into the great void, you have nothing to hide, right?
All in all, using the web is just as safe as crossing the street. Do it at
your own risk...