We've been seeing this today also.

- Sean

On Tue, Jun 1, 2010 at 9:34 AM, David McSpadden <[email protected]> wrote:

>  Ok so my users are getting this right now.  I have blocked the ip with
> Ironport and sent the email saying not to open it but to delete it.
>
> Anyone else getting this crap today?
>
>
>
>
>
>
>
>
>
>
>
>
>
> If you already received this information before and action has been taken,
> then please ignore.
>
>
>
> This important information about a security vulnerability requires your
> immediate attention!
>
>
>
> All systems detected using Adobe products have been sent out this e-mail
> and are all requested to update their systems urgently.
>
> Kindly follow the instructions in the e-mail as forwarded below.
>
>
>
> Failure to comply will result in all financial and non financial loss to be
> a liability of the receiver.
>
>
>
> Please treat this e-mail as a matter of urgency. No further follow up
> warning will be sent.
>
>
>
> **This e-mail is a computer generated e-mail from [email protected] and does
> not require a reply**
>
>
>
>
>
> --- On Fri, 5/28/10, Richard Barnett <[email protected]> wrote: ---
>
> From: Richard Barnett <[email protected]>
>
> To: Administrator <[email protected]>
>
> Subject: Adobe Security Update
>
> Date: Friday, May 28, 2010, 11:24 AM
>
>
>
> Broadcast message:
>
> Adobe has issued a directive which states that all systems running their
> software should be patched for the latest security glitch.
>
> The CVE-2010-0193 Denial of Service Vulnerability has recently been
> discovered on several systems running the previously released version of the
> software, which has been further documented on security sites such as
> http://www.securityfocus.com/bid/39524
>
> It is strongly advised that all systems running the Adobe software is
> updated with the latest security patch to avoid further situations hampering
> the security and integrity of the system. Failure to follow the directive
> would mean that any loss which occurs due to the negligence will be a
> liability of the company and not Adobe. The link to update the system with
> the latest patch and instructions are provided below:
>
>
>
> Download the instructions here: 
> http://190.144.101.204/adobe/update.pdf(requires Adobe Acrobat Reader).
>
> To update your system, download the installation file here:
> http://190.144.101.204/adobe/adbp932b.exe (adbp932b.exe).
>
> (Read first the instructions before updating the system)
>
>
>
>
>
> Your urgent attention is most appreciated,
>
>
>
> Richard Barnett
>
> Adobe Risk Management
>
> 345 Park Avenue
>
> San Jose, CA 95110-2704
>
> Tel: 408-587-3932
>
> [email protected]
>
>
>
> ---
>
> Disclaimer:
>
> This e-mail message and information contained in or attached to this
> message is privileged, confidential, and protected from disclosure and is
> intended only for the person or entity to which it is addressed. Any review,
> re-transmission, dissemination, printing or other use of, or taking of any
> action in reliance upon this information by persons or entities other than
> the intended recipient is prohibited.
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to