lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: mlande at bellsouth.net (Mary Landesman) Subject: Trojan Horse for Mac OS X Judging from the number of people who use those mail clients and still manage to infect themselves with whatever email worm du jour, I'd guess quite a few. :-) I try never to underestimate the end user. I don't know how many times I've looked at someone's 'allowed' list on a permission-based firewall and found various spyware and Trojans sitting there with full rights. And the attachment feature in Outlook and OE is just buggy enough to cause lots of folks to disable it, just to view (for example) a perfectly benign pdf. Once it's been disabled, it's relatively easy to forget to go back and enable it. -- Mary ----- Original Message ----- From: "Larry Seltzer" <larry@...ryseltzer.com> To: "'Mary Landesman'" <mlande@...lsouth.net> Cc: "'Full-Disclosure'" <full-disclosure@...ts.netsys.com> Sent: Friday, April 09, 2004 9:12 PM Subject: RE: [Full-Disclosure] Trojan Horse for Mac OS X You might have noticed I said "by default". How many people do you really think change that setting. Seriously. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.ziffdavis.com/seltzer larryseltzer@...fdavis.com -----Original Message----- From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Mary Landesman Sent: Friday, April 09, 2004 7:45 PM To: Larry Seltzer; 'Joshua Levitsky'; 'Thomas Vincent' Cc: 'Full-Disclosure' Subject: Re: [Full-Disclosure] Trojan Horse for Mac OS X Check out Tools, Options, Security, Do not allow executable attachments... Uncheck it. Voila. Still there. Not removed. Just suppressed. And under complete end user control. -- Mary ----- Original Message ----- From: "Larry Seltzer" <larry@...ryseltzer.com> To: "'Joshua Levitsky'" <jlevitsk@...hie.com>; "'Thomas Vincent'" <thomasv@....com> Cc: "'Full-Disclosure'" <full-disclosure@...ts.netsys.com> Sent: Friday, April 09, 2004 6:53 PM Subject: RE: [Full-Disclosure] Trojan Horse for Mac OS X >> This technique wouldn't work now because Mail.app, and probably all >> modern mail client. Will not let you execute code from within the mail >> client. >Completely untrue. Mail.app will ask you if you want to open the app just like Outlook Express on Windows does. Actually, Outlook Express and Outlook will (by default) strip all executable attachments before you even get them. They've done this for some time. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.ziffdavis.com/seltzer larryseltzer@...fdavis.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists