lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <01c301c41ea6$c8c5ff00$0c01a8c0@MLANDE>
From: mlande at bellsouth.net (Mary Landesman)
Subject: Trojan Horse for Mac OS X

Judging from the number of people who use those mail clients and still
manage to infect themselves with whatever email worm du jour, I'd guess
quite a few. :-)

I try never to underestimate the end user. I don't know how many times I've
looked at someone's 'allowed' list on a permission-based firewall and found
various spyware and Trojans sitting there with full rights. And the
attachment feature in Outlook and OE is just buggy enough to cause lots of
folks to disable it, just to view (for example) a perfectly benign pdf. Once
it's been disabled, it's relatively easy to forget to go back and enable it.

-- Mary

----- Original Message ----- 
From: "Larry Seltzer" <larry@...ryseltzer.com>
To: "'Mary Landesman'" <mlande@...lsouth.net>
Cc: "'Full-Disclosure'" <full-disclosure@...ts.netsys.com>
Sent: Friday, April 09, 2004 9:12 PM
Subject: RE: [Full-Disclosure] Trojan Horse for Mac OS X


You might have noticed I said "by default". How many people do you really
think change
that setting. Seriously.

Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.ziffdavis.com/seltzer
larryseltzer@...fdavis.com
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Mary Landesman
Sent: Friday, April 09, 2004 7:45 PM
To: Larry Seltzer; 'Joshua Levitsky'; 'Thomas Vincent'
Cc: 'Full-Disclosure'
Subject: Re: [Full-Disclosure] Trojan Horse for Mac OS X

Check out Tools, Options, Security, Do not allow executable attachments...

Uncheck it. Voila. Still there. Not removed. Just suppressed. And under
complete end
user control.

-- Mary

----- Original Message -----
From: "Larry Seltzer" <larry@...ryseltzer.com>
To: "'Joshua Levitsky'" <jlevitsk@...hie.com>; "'Thomas Vincent'"
<thomasv@....com>
Cc: "'Full-Disclosure'" <full-disclosure@...ts.netsys.com>
Sent: Friday, April 09, 2004 6:53 PM
Subject: RE: [Full-Disclosure] Trojan Horse for Mac OS X


>> This technique wouldn't work now because Mail.app, and probably all
>> modern mail client. Will not let you execute code from within the mail
>> client.

>Completely untrue. Mail.app will ask you if you want to open the app just
like Outlook
Express on Windows does.

Actually, Outlook Express and Outlook will (by default) strip all executable
attachments
before you even get them. They've done this for some time.

Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.ziffdavis.com/seltzer
larryseltzer@...fdavis.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ