TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: Antti Kurenniemi
from: Glenn Meadows
date: 2005-12-30 07:06:12
subject: Re: Yet another Extremely Critical Windows Security Hole

From: "Glenn Meadows" 

We're still not sure where our sales guy got the infection from.  One thing
he's NOT, is a rogue web surfer.  Basically, he reads/replies to his email,
one account in Outlook, with Chilton Preview installed, and the other a
secure web access to Exchange at our record distributors.

In the clean-up process, I killed all his IE links, history, cache,
cookies, etc., so at this point, a back-track is a bit harder. 

--

Glenn M.
"Antti Kurenniemi"  wrote in
message news:43b4c0cd$1{at}w3.nls.net...
> "Geo"  wrote in message
news:43b444b6$4{at}w3.nls.net...
>> Mitigating Factors:
>> .In a Web-based attack scenario, an attacker would have to host a Web
>> site
>> that contains a Web page that is used to exploit this vulnerability. An
>> attacker would have no way to force users to visit a malicious Web site.
>> Instead, an attacker would have to persuade them to visit the Web site,
>> typically by getting them to click a link that takes them to the
>> attacker's
>> Web site.
>>
>>
>> why do they keep insisting on this crap being so hard to do, didn't I
>> already show everyone here how easy it is to send them off to a website
>> of
>> my choosing via a pdf file, and it can be done via a wmv file just as
>> easily
>> as both formats contain features to specifically allow this. Simply mass
>> emailing of one of these file formats would compromise millions. Hell,
>> email
>> pdf's named PurchaseOrder.pdf would compromise more business users than
>> anyone could imagine.
>
> Or an "innocent" looking spam message with an unsubscribe
link to the said
> website...
>
>
> Antti Kurenniemi
>
>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.