lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: purdy at tecman.com (Curt Purdy)
Subject: FW: Last Microsoft Patch

Anybody else get this?  Looks legit, originating address is from msnbc.com.
But can't believe even Microsoft would be this stupid after the rash of
trojan-attached "patch announcements" lately.  Plus all security people have
been saying that Microsoft would never email a patch out.  Or are they
thinking, "Send this out so all the stupid people will click on this before
they click on a real trojan?
Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
Information Security Engineer
DP Solutions
cpurdy@...ol.com

----------------------------------------

If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- former White House cybersecurity zar Richard Clarke

-----Original Message-----
From: admin-owner@....net [mailto:admin-owner@....net]On Behalf Of Technical
Services
Sent: Tuesday, October 14, 2003 11:33 AM
To: MS Corporation User
Subject: [inbox] [admin] Last Microsoft Patch


        Microsoft    All Products |  Support |  Search |  Microsoft.com
Guide
      Microsoft Home


      Microsoft User

      this is the latest version of security update, the "October 2003,
Cumulative Patch" update which eliminates all known security vulnerabilities
affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as
three new vulnerabilities. Install now to help protect your computer from
these vulnerabilities, the most serious of which could allow an malicious
user to run code on your system. This update includes the functionality of
all previously released patches.


       System requirements  Windows 95/98/Me/2000/NT/XP
       This update applies to  MS Internet Explorer, version 4.01 and later
      MS Outlook, version 8.00 and later
      MS Outlook Express, version 4.01 and later
       Recommendation Customers should install the patch at the earliest
opportunity.
       How to install Run attached file. Choose Yes on displayed dialog box.
       How to use You don't need to do anything after installing this item.

      Microsoft Product Support Services and Knowledge Base articles can be
found on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security
Advisor web site, or Contact Us.

      Thank you for using Microsoft products.

      Please do not reply to this message. It was sent from an unmonitored
e-mail address and we are unable to respond to any replies.

--------------------------------------------------------------------------
      The names of the actual companies and products mentioned herein are
the trademarks of their respective owners.

     Contact Us  |  Legal  |  TRUSTe
     ?2003 Microsoft Corporation. All rights reserved. Terms of Use  |
Privacy Statement |  Accessibility
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031015/d2bafa37/attachment.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 3639 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031015/d2bafa37/attachment.gif
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/gif
Size: 359 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031015/d2bafa37/attachment-0001.gif

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ