Received: from www.unhca.com by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 18 Feb 2002 06:22:59 -0800 (PST) Received: by unhca.com (mbox cv) (with Cubic Circle's cucipop (v1.31 1998/05/13) Mon Feb 18 06:26:57 2002) X-From_: cv@unhca.com Mon Feb 18 06:25:23 PST 2002 Actually-To: cv Received: from unknown@12.232.72.152 (red.all.net) by ManAlMail id MAM14316 for cv(/var/spool/mail/cv) on or about 2002/02/18 06:25:24 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1IELOi20336 for cv@unhca.com; Mon, 18 Feb 2002 06:21:24 -0800 Message-Id: <200202181421.g1IELOi20336@red.all.net> Subject: [cv@unhca.com][iwar] [NewsBits] NewsBits - 02/15/02 (fwd) To: cv@unhca.com (CJ628 UNH Class) Date: Mon, 18 Feb 2002 06:21:24 -0800 (PST) Reply-To: cv@unhca.com From: fc@red.all.net Old-Reply-To: fc@all.net Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Virus smuggling risk for Outlook Express users Security researchers have identified a way to smuggle virus laden emails past AV checkers and into the in-boxes of Outlook Express users. A demo suggests it's possible to send attachments to Outlook Express users using non-standard attachment techniques, by encapsulating the data in Carriage Return () specifiers in the subject line of an email. http://www.theregister.co.uk/content/55/24085.html
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST