I haven't yet... but the article i saw this morning said desktop searches
(such as msn or google desktops) are able to trigger the exploit without the
user clicking. I always knew they were bad apps. :)
also - the exploit isn't in the jpg file format - but because of the way
images are handled, a wmf can be renamed to jpg and the image viewer reads
the header and opens it as a wmf. AFAIK, it's how all images are handled so
any image format can be host for it - it just happens to be that the jpp
extension was used. This means there is no safe image format.
On 1/1/06, Stephen Bird <[EMAIL PROTECTED]> wrote:
P.S. Has anyone used the patch Bernie told us about? Thoughts? Thanks.
>
>
> --
> Diane Poremsky
> [EMAIL PROTECTED]
--
----------------------------------------
To unsubscribe, mailto: [EMAIL PROTECTED]
Is your picture included in the Official Win-Home List Members Profiles Page?
http://www.besteffort.com/winhome/Profiles.html
If not, write to: [EMAIL PROTECTED]