I read on Macintouch today that apparently IE 5.1 in OS X, upon encountering
an .hqx encoded file, automatically decodes it (Explorer does, not Stuffit),
and then porceeds to EXECUTE IT!!!

The person that brought this up provided an illustrative example to show how
a small C program can easily be automatically executed by this exploit.

I tried it, and it's true.

If this is desired behavior, I just have to ask: "Damn, folks, what ARE you
thinking?"

Haven't the slew of exploits on the Windows side taught everyone a valuable
lesson, or are mandatory security holes a new MS edict, and all software
groups MUST incorporate near fatal security backdoors in their products?

Is there a work-around? Will this be plugged (please)? Why was this decided
(seriously, whose brainiac idea *was* this?)

Please, help us out here and shed some light on this.

Harry


To unsubscribe send mail to [EMAIL PROTECTED]
To search the archives: 
          <http://www.mail-archive.com/macie-talk%40lists.boingo.com/>

Reply via email to