unpatched vulnerability in OL2000-2003

N

nutso fasst

http://secunia.com/advisories/12041

Someone in Russia is trying to take advantage of this. I received an HTML
email with header forged to appear to be from a known source. No malicious
attachments. The HTML included this element:

<object data="http://www.vikord.com/default.htm">

Unobfuscated, the URL is www.vikord.com/default.htm, a Russian domain. The
web page tries to run an active-x control. IF I had forwarded the message to
the forged recipient to show them their address was being spoofed and IF I
were using MS-WORD as email editor, the active-x control would have run
without warning and my system would probably be infected with something.

Is MS working to fix this issue?

Does anyone know how to find out what a malevolent web page is trying do
without getting whacked? Since the orginating IP of the email is in the USA,
I suspect it is a trojan purveyor.

nf
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top