Hi Robert, Protected Mode and UAC are different security features. But even though, it is possible to access local resource ("res://") links with Protected Mode and UAC features enabled. You can test it yourself here: http://www.raffon.net/research/ms/ie/navcancl/cnn.html or watch the demo video here: http://raffon.net/videos/ie7navcancl.wmv. The only way to mitigate this vulnerability by an out-of-the-box security feature is to set the security level of the "Internet Zone" to "High". This will disable "javascript:" links, so the user will not be able to click the "Refresh the page." link in the navcancl.htm local resource page. But, I doubt anyone will do that when they can simply just avoid clicking any link in the "Navigation Canceled" page. --Aviv. -----Original Message----- From: robert@xxxxxxxxxxxxxxxxxxxxxxxxxx [mailto:robert@xxxxxxxxxxxxxxxxxxxxxxxxxx] Sent: Thursday, March 15, 2007 5:13 PM To: bugtraq@xxxxxxxxxxxxxxxxx Subject: Re: Phishing using IE7 local resource vulnerability This appears to be mitigated in Vista by Protected Mode, which is on by default, and denies access to local resources. If people decide to disable UAC, they must accept the potential risks that come with it, such as this XSS attack. I appreciate that this is a valid risk for XP.