I doesn't matter if it is patched.  If the user is enticed to open the
script anyway, regardless of warning dialogs, etc., then the script will
still do it's damage.  We had users ignore the warnings because they thought
it couldn't be harmful.  I'm not commenting on the users computer ability or
intelligence, but the point is that somehow they felt it was OK to open
these scripts, even though the system put up roadblocks and warnings.  The
end result is that I spent hours chasing gremlins despite all of the
security patches, etc.

Our policy has become one of simply deleting any email with a .js or .vbs
attachment, under the assumption that any e-mail with these attachments is
malicious.  In essence, we are not going to even give the user the option of
ignoring or executing a script, because it has proved damaging to our system
and our clients systems to do so.

My 2 cents worth only.

Mark.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of NetQuick Email
Admin
Sent: Friday, May 05, 2000 16:57
To: [EMAIL PROTECTED]
Subject: Re: [IMail Forum] Don't forget .js extensions!


I believe that Microsoft released a patch to stop the JScript security hole.

Kevin Childers
Mail Administrator
[EMAIL PROTECTED]
The Carolina's Fastest Internet Service Provider
www.NetQuick.net
(910) 486-7845 Ext. 23

----- Original Message -----
From: "Mark L. Holman" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, May 05, 2000 5:20 PM
Subject: RE: [IMail Forum] Don't forget .js extensions!


> I mispoke.  I meant to say JScript, Microsoft's version of JavaScript.
The
> difference is the environment in which the script is run.  Under the
Windows
> Scripting Host, you do not get the benefits of Java security.  VBScript
and
> JScript are essentially the same thing to the WSH.
>
> Mark.
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of
> [EMAIL PROTECTED]
> Sent: Friday, May 05, 2000 16:01
> To: [EMAIL PROTECTED]
> Subject: Re: [IMail Forum] Don't forget .js extensions!
>
>
> Are you sure about that?  I would think that a JavaScript program wouldn't
> be able to either reproduce or do much damage.  JavaScript has heavy
> security built into it, unlike VBS which is essentially a free-for-all
like
> EXE files.
>                               -Scott
>
>
> ---------- Original Message ----------------------------------
> From: "Mark L. Holman" <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> Date: Fri, 5 May 2000 15:25:56 -0500
>
> There has been some discussion of rules for filtering out .vbs files.
Don't
> forget that .js files are also associated with the Windows Scripting Host,
> and they need to be filtered also.  After all, the LoveBug .vbs code was
> written in VBScript, and it would not be difficult to replicate the virus
in
> JavaScript.
>
> Mark L. Holman
> Director, Systems Integration
> Information Technology Builders, Inc.
> (850) 269-1160 x24
> [EMAIL PROTECTED]
> http://www.itbinc.com
>
> Please visit http://www.ipswitch.com/support/mailing-lists.html
> to be removed from this list.
>
> Please visit http://www.ipswitch.com/support/mailing-lists.html
> to be removed from this list.
>
> Please visit http://www.ipswitch.com/support/mailing-lists.html
> to be removed from this list.
>

Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.

Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

Reply via email to