lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <04a301c39fae$7e9f4980$30bde7c1@rdsbv.ro>
From: andrei at fq.ro (Andrei Galca-Vasiliu)
Subject: IEpatch.exe?

It wass discussed earlyer, microsoft doesn`t send patches by mail :))
Regards

--
Andrei Galca-Vasiliu
Customer Support
Brasov Branch
Romania Data Systems
T: +402 68 474133  F: +402 68 474133
www.rdsnet.ro
--
Privileged/Confidential Information may be contained in this message.
If you are not the addressee indicated in this message (or responsable
for delivery of the message to such person), you may not copy or
deliver this message to anyone. In such a case, you should destroy
this message and kindly notify the sender by reply e-mail.
--
----- Original Message ----- 
From: "J?rgen R. Plasser" <plasser@...agon.at>
To: <full-disclosure@...ts.netsys.com>
Sent: Friday, October 31, 2003 1:03 PM
Subject: [Full-Disclosure] IEpatch.exe?


> Has anyone seen this Email before:
>
> From: Microsoft Corp. <support@...rosoft.com>
> Subject: [Users] You must patch your Internet Explorer.
>
> Text:
>
> > Microsoft official patch for IE, AntiBlasterWorm 1.1
> >
> > Microsoft released a security patch on 20.10.2003 designed
> > to fix two security vulnerabilities in all versions of its
> > Internet Explorer web browser.
> >
> > The worm, W32.Blaster.Worm and its variants infects your
> > computer through security holes in Microsoft web browser,
> > Internet Explorer.This worm also has the potential to exploit
> > a similar issue that is addressed by Microsoft Security
> > Bulletin MS03-039. These issues concern a vulnerability in the
> > Remote Procedure Call (RPC) function.
> >
> > So, we ask you that you patched your version of Internet Explorer.
> > You must patch your version of Internet Explorer,otherwise,
> > virus can infect your computer at days.
> >
> > Your patch-program was attached to this letter.
> >
> > 1. Personal Information
> >    ------------------------------
> >
>
> -------------------------------------------------------------------------
> > ---        *** Your KEY: HFKFLW63JKGFF348FLD0467D ***
> >
>
> -------------------------------------------------------------------------
> > ---
> > If you have any questions, please read a file (README.TXT).
> >
> > 2. Technical support
> >    ---------------------------
> >
> >   For technical support questions, please go to
> >   http://www.microsoft.com
> >
> >
> >             --------------------------------------------------
> >                Thank you for using Microsoft!
> >             --------------------------------------------------
>
> Attachment: IEpatch.exe, README.txt
>
> The README.txt contains:
>
>
> > Microsoft Internet Explorer official patch AntiBlasterWorm 1.1
> > ==================
> > Version: 1.1
> >
> > (c) Copyright Microsoft, Inc. All Rights Reserved.
> >
> >
> >     1. Personal Information
> >        -----------------------------------
> >        Your KEY:  HFKFLW63JKGFF348FLD0467D
> >        -----------------------------------
> >
> > Table of Contents
> > -----------------
> >
> >   2. Installation instructions
> >   3. Technical support
> >
> >
> > Installation instructions
> > -------------------------
> >
> >   To install AntiBlasterWorm 1.1, you should follow the following simple
> > steps:
> >
> >   1. Run the installer program by double-clicking on the
> >      IEpatch.exe icon.
> >   3. Follow the instructions of the installer program to install the
> >      AntiBlasterWorm 1.1.
> >   4. Done! The Internet Explorer should be patched.
> >
> >
> > Technical support
> > -----------------
> >
> >   For technical support questions, please go to
> >   http://www.microsoft.com
>
> -- 
> J?rgen
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ