On Thu, 6 Jan 2005 00:10:51 -0500 (EST), D. Glenn Arthur Jr. wrote:

> The first is a simple privacy exposure:  some spam
> includes references to images to be loaded from a web server,
> rather than included in the message itself, and the filname
> of an image will be coded with the recipient's address to let
> the spammer know that that message was opened and viewed in
> an HTML-aware MUA -- that the address does actually reach a
> human.

Not necessarily a simple privacy exposure.  With the recent
vulnerabilities discovered in the decoding of a couple of different
types of graphic files (PNG, I think, and maybe JPG), the "load an
image from a foreign server" that used to be a simple "web bug" privacy
exposure can now be a direct, executable-code-injection, take over your
system vulnerability.



TTYL, DougF KG4LMZ


Reply via email to