On Mon, 1 Mar 2004, Todd Vierling wrote:

> On Mon, 1 Mar 2004, Curtis Maurand wrote:
> 
> : Sure they do....its called COM/DCOM/OLE/ActiveX or whatever they
> : want to call it this week.  Its on every windows system.
> 
> No, my point was that the majority of newer trojan mail viruses don't depend
> on ActiveX exploits -- they simply wait, dormant, for a n00b to click on
> this mysterious-looking Zip Folder, and the mysterious-looking EXE inside.
> 
> It's as if the modern e-mail viruses are closer to human infections.  Only
> the clueful are immune.  8-)

The latter is very true.

My point is that the COM/DCOM/OLE/ActiveX is what allows for a script in 
an email message that gets executed to have access to the rest of the 
system, rather than executing within a protected sandbox.  Of course 
scripts within email messages shouldn't execute at all.  Once they do 
execute, they have access to the OLE objects on the machine.  Its a 
security hole big enough to drive a tank through. 


> 
> 

-- 
--
Curtis Maurand
mailto:[EMAIL PROTECTED]
http://www.maurand.com


Reply via email to