* Christopher X. Candreva <[EMAIL PROTECTED]> [Dec 04. 2003 15:50]: > On Thu, 4 Dec 2003, jef moskot wrote: > > > I've heard of a new strategy for spreading viruses/worms. The victim > > receives a message with an attached passworded zip file. The password is > > included in the text of the message. > > Off-hand I don't see this being a large threat. You are counting on people > to either have winzip installed, or be able to download it, then have to > type in a password correctly. >
In the current version sane users would probably recognize the danger and avoid infection. What about future versions? I suppose the extracting/password stuff could be triggered for example by an iframe exploit, codebase tag or the next virus-friendly local code execution "feature" introduced by M$. Wouldn't that be possible with winzip installed in the default path? > ========================================================== > Chris Candreva -- [EMAIL PROTECTED] -- (914) 967-7816 > WestNet Internet Services of Westchester > http://www.westnet.com/ Regards, Jonas ------------------------------------------------------- This SF.net email is sponsored by: IBM Linux Tutorials. Become an expert in LINUX or just sharpen your skills. Sign up for IBM's Free Linux Tutorials. Learn everything from the bash shell to sys admin. Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click _______________________________________________ Clamav-users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/clamav-users