script language=JScript.Encode[EMAIL PROTECTED]@#@[Km!:+
[EMAIL PROTECTED] RANDOM [EMAIL PROTECTED]@iioAAA==^#~@/script
I am gonna go ahead and assume that this is where the Action takes
place.
I am now going to do a body filter (bad, I know) to block anything with
Jscript.Encode in it.
Oh great... just what we need now. Another avenue for viruses to come after
us?
Does anybody know anything more about this JPEG vulnerability they're
talking about? Are there even any viruses that use this yet? I haven't
installed Microsoft's patch yet and wondered what other people's thoughts
Yea this one doesnt look good. Hope Declude can come up with a way to
identify these exploit jpeg images in email
http://www.us-cert.gov/cas/alerts/SA04-258A.html
http://www.microsoft.com/security/bulletins/200409_jpeg.mspx
http://www.microsoft.com/technet/security/bulletin/MS04-028.mspx
Rick
Does anybody know anything more about this JPEG vulnerability they're
talking about?
Every single JPEG (or other graphic format) vulnerability that I have heard
of has been a hoax (including the one that McAfee sent out press releases
about). One involved hiding information in the graphic
Unfortunately this is from Microsoft's main web page, just click on the
Critical Update in the upper right corner of the page.
I'm still trying to figure out how a virus can hide in a JPEG?
- Rodney
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of R. Scott
I ran the windows update on my desktop and it went fine, however if you use
Net Meeting I would hold off. After installing the patches Microsoft sends,
when I try to start Net Meeting the screen goes blank and the PC reboots. I
have sent an issue to Microsoft, but have not heard anything back
Hi,
I'm still trying to figure out how a virus can hide in a JPEG?
JPEG, TIFF and a few other formats are really structured file formats,
where a single file contains multiple distinct components, e.g., a full
size image and a thumbnail image, IPTC and EXIF descriptions, even XML
formatted
Unfortunately this is from Microsoft's main web page, just click on the
Critical Update in the upper right corner of the page.
I'm still trying to figure out how a virus can hide in a JPEG?
It does appear to be legit.
The issue here isn't the common method of running programs in extensions
that
My guess is that the JPEG exploit would only be used to run a virus
payload that lies elsewhere, such as in the body of a message. So you
might get a combination of an EXE with a JPEG, and by just viewing the
JPEG the EXE would be executed. Hopefully this is the case because I
don't want to