Reg Mouatt said:Am having a problem downloading the patch. The details of the failure
to download are given as "Firefox could not check for updates for the
following components (either the update server(s) did not respond or
the update service(s) were not found)". In the dialogue box was the
message 'DOM Inspector'.
Please don't just take my word for this... The "vulnerability" can
easily be tested in any Gecko-based product by arranging for whatever
HTML content it renders to include the URL "shell:cookies" and cliking
that link or otherwise causing the app to follow that link -- if
vulnerable a Windows Explorer window will open displaying the contents
of one or other of the cookies folders on the test machine. Once the
The exploit is enabled by the setting in Agent's config file urltype.dat
for Type:Shell. Setting it to Enable:0 seems to fix it. I never modified
the setting for this type of link previously, never noticed it in any
documentation and can't find an interface to it within the Agent
program.
charles said:I find Forte Agent 1.93/32.576 is also susceptible to this exploit.
Clicking on "shell:cookies" in Forte Agent will open an Explorer window
with IE's cookies in it.
You mean if you take the trouble to create such an exploit it works?charles wrote said:Please don't just take my word for this... The "vulnerability" can
easily be tested in any Gecko-based product by arranging for whatever
HTML content it renders to include the URL "shell:cookies" and cliking
that link or otherwise causing the app to follow that link -- if
vulnerable a Windows Explorer window will open displaying the contents
of one or other of the cookies folders on the test machine. Once the
Well here's a surprise; maybe I should rename this thread to something
relevant to Forte Agent. I will at least crosspost this msg anyway to
the a.u.o-r.f-a and a.u.o-r.f-a.m groups.
I find Forte Agent 1.93/32.576 is also susceptible to this exploit.
Clicking on "shell:cookies" in Forte Agent will open an Explorer window
with IE's cookies in it.
The exploit is enabled by the setting in Agent's config file urltype.dat
for Type:Shell. Setting it to Enable:0 seems to fix it. I never modified
the setting for this type of link previously, never noticed it in any
documentation and can't find an interface to it within the Agent
program.
I would imagine all the above holds for other versions of Agent.
Here is the relevant section in urltype.dat (after fix) -
Type: Shell
Name:
Enable: 0
UseHttp: 0
RemovePrefix: 0
Mode: 0
App: %SystemRoot%\Explorer.exe /idlist,%I,%L
UseDde: 1
DdeMethod: 0
DdeApp: Folders
DdeTopic: AppProperties
DdeMsg: [ViewFolder("%l", %I, %S)]
You mean if you take the trouble to create such an exploit it works?
What a surprise!
Agent as shipped doesn't contain any URLTypes entry for shell:.
I find Forte Agent 1.93/32.576 is also susceptible to this exploit.
Clicking on "shell:cookies" in Forte Agent will open an Explorer window
with IE's cookies in it.
The exploit is enabled by the setting in Agent's config file urltype.dat
for Type:Shell.
I think it's under [Options] [General Preferences] [URL Types]Free Agent has no such clickable option that I can find.
Free Agent has no such Type listed.
charles wrote said:Well, I've had Agent on this machine a long while through a number of
updates and, as I said initially, I never modified the setting for this
type of link, nor in fact did I realize the type existed to begin with.
How it inserted itself into urltype.dat is a mystery.
The entry does not exist in the latest install which I just ran to see.
Gremlins no doubt.