From: "The Fool" <[EMAIL PROTECTED]>

> Klez is a mass-mailing worm which searches the Windows address book for
> email addresses and sends messages to all recipients that it finds. The
> worm uses its own SMTP engine to send the messages. ____It can also spoof
> the 'From' in messages, a factor which has resulted in widespread
> confusion about the bug____.
>
> The subject and attachment name of incoming emails is randomly chosen,
> making it harder for users to spot. The attachment will have one of the
> following extensions: .bat, .exe, .pif or .scr. Klez is capable of
> infecting files.
>
> The worm exploits a vulnerability in Microsoft Outlook and Outlook
> Express in an attempt to execute itself when you open or even preview the
> message.
>

My question is simple, weren't these exploits in Lookout Express and Lookout
(of course I mean Outlook, but Lookout is what I call it) patched last year?
Anyone can go online, download the latest critical updates, and be done with
it.  Who in their right mind relies on a Mircosoft product and doesn't
install the critical updates as they are made available?  Makes no matter
anyhow, because with all the past, present, and future exploits, only an
idiot would run Outlook with the security settings on anything other than
restricted sites zone, which in itself should prevent most of the exploits
(unless the user does something stupid and choses to open the
attatchments)... unfortunately the default settings are very relaxed in
security, and not a lot of people know how to change those settings (and
apparantly not a lot of people patch their software either).

Michael Harney
[EMAIL PROTECTED]

We do not inherit the Earth from our parents; we borrow it from our
children.  -  Native American Phylosophy

Reply via email to