* Christopher X. Candreva <[EMAIL PROTECTED]> [Dec 04. 2003 15:50]:
> On Thu, 4 Dec 2003, jef moskot wrote:
> 
> > I've heard of a new strategy for spreading viruses/worms.  The victim
> > receives a message with an attached passworded zip file.  The password is
> > included in the text of the message.
> 
> Off-hand I don't see this being a large threat. You are counting on people
> to either have winzip installed, or be able to download it, then have to
> type in a password correctly.
> 

In the current version sane users would probably recognize the danger and avoid
infection. 

What about future versions?
I suppose the extracting/password stuff could be triggered for example
by an iframe exploit, codebase tag or the next virus-friendly local code
execution "feature" introduced by M$.
Wouldn't that be possible with winzip installed in the default path?

> ==========================================================
> Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
> WestNet Internet Services of Westchester
> http://www.westnet.com/

Regards, Jonas


-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills.  Sign up for IBM's
Free Linux Tutorials.  Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to