| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Yet another Extremely Critical Windows Security Hole |
From: "Glenn Meadows"
We're still not sure where our sales guy got the infection from. One thing
he's NOT, is a rogue web surfer. Basically, he reads/replies to his email,
one account in Outlook, with Chilton Preview installed, and the other a
secure web access to Exchange at our record distributors.
In the clean-up process, I killed all his IE links, history, cache,
cookies, etc., so at this point, a back-track is a bit harder.
--
Glenn M.
"Antti Kurenniemi" wrote in
message news:43b4c0cd$1{at}w3.nls.net...
> "Geo" wrote in message
news:43b444b6$4{at}w3.nls.net...
>> Mitigating Factors:
>> .In a Web-based attack scenario, an attacker would have to host a Web
>> site
>> that contains a Web page that is used to exploit this vulnerability. An
>> attacker would have no way to force users to visit a malicious Web site.
>> Instead, an attacker would have to persuade them to visit the Web site,
>> typically by getting them to click a link that takes them to the
>> attacker's
>> Web site.
>>
>>
>> why do they keep insisting on this crap being so hard to do, didn't I
>> already show everyone here how easy it is to send them off to a website
>> of
>> my choosing via a pdf file, and it can be done via a wmv file just as
>> easily
>> as both formats contain features to specifically allow this. Simply mass
>> emailing of one of these file formats would compromise millions. Hell,
>> email
>> pdf's named PurchaseOrder.pdf would compromise more business users than
>> anyone could imagine.
>
> Or an "innocent" looking spam message with an unsubscribe
link to the said
> website...
>
>
> Antti Kurenniemi
>
>
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.