lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <00fc01c22fff$027da5b0$0a00a8c0@violetclub>
From: mail at blazde.co.uk (Roland Postle)
Subject: Re: Outlook Express Attachment Property Spoofing Vulnerabilities

So why hasn't MS fixed them then? Will it take a big email virus, and more
mass hysteria, before they do?

Personally I get sent a lot of virus and rely on knowing the extension. They
frequently use the spaces before extension vulnerability (so I'll get
somthing like 'hello.mp3     .scr') but I always notice these before opening
them anyway. However, combined with the other vulnerabilities you mention I
could probably be tricked into opening a virus. God help the clueless
people.

- Blazde

----- Original Message -----
From: "Jack" <jack@...ware.com>
To: <news@...uriteam.com>; <bugtraq@...urityfocus.com>;
<full-disclosure@...ts.netsys.com>
Cc: <mattmurphy@...rr.com>
Sent: Saturday, July 20, 2002 2:27 PM
Subject: [Full-Disclosure] Re: Outlook Express Attachment Property Spoofing
Vulnerabilities


> Dude, they are all two years old:
>
> http://www.securityfocus.com/bid/2260
> http://www.securityfocus.com/bid/3271
>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ