Brita wrote:
> I thought Mike D had put in a fix for it already.  Yikes, what an ugly
> bug showed up on my screen.  But not for long.

Okay, it took me a while to find out where this bug came from. Yes, it
was the post from Nancy, dbl...@cfl.rr.com, to the "Personal
Experience Update" thread.

The bug is an embedded Visual Basic script in the HTML portion of
Nancy's e-mail.

She's using Microsoft Outlook Express and has HTML formatting turned 
on. This allows Outlook to embedd one copy of the message in one part 
of the MIME multipart message, labeled "Content-Type: text/plain" ...

... followed by another copy of her message identified as
"Content-Type: text/html" ... this one formatted in HTML, which adds
*LOTS* of size and no informational value to her message, but allows
her to use bold, italics, various fonts and character sizes, colors
and whatever, if she chooses. 

Unfortunately, HTML formatting also permits the message to contain an
executable script, embedded invisibly right along with the text of her
message, contained within <script>... </script> tags. Everything in
between appears to my untrained eye to be a Visual Basic Script
ActiveX control which seems, at least, to modify autoexec.bat and add
lines to the registry. 

I also understand from further study that it mucks around with Outlook 
Express settings as well, making a copy of itself the default signature 
file for messages you send out using Outlook, thus assuring its 
propagation to other systems.

You can get more info about this worm at the following URL:

http://www.antivirus.com/pc-cillin/vinfo/

Kakworm is one of the "top 10 viruses" in the list, or you can enter 
kakworm.a in the search window...

Brita wrote:
> I thought Mike D had put in a fix for it already.

I've blocked parts of a multipart message which contain executables, 
batch files, scripts and the like. I haven't done anything to block 
embedded scripts like this. In fact it's the first example I've seen of 
the fabled "malicious HTML" they've always warned us about.

I didn't get the bug because my mail reader always asks if I want to 
view HTML messages in the browser or as plain text. I always choose 
text. Outlook Express users are not so lucky, as the default 
configuration displays the message in the "preview" window, which, due 
to a gaping security flaw, actually allows the script to execute and 
infect the system.

I believe that the most current updates to Outlook Express and
Internet Explorer plug this security hole, but everybody who has *not*
visited the Microsoft Update web site on a regular basis is still
vulnerable (which I imagine is most people).

Can anybody give us concise instructions for upgrading our security
settings to make it less likely to catch this sort of bug?

I'll start doing some digging to see if I can find or build a procmail
script to strip out embedded scripts from HTML, or maybe tackle the
job of dumping HTML entirely, tho that's a whole 'nuther level of
complexity, so I hear, given the inglorious profusion of incompatible
variations on all the standards.

Once again, this foolishness is brought to you by the highly competent 
and skilled programmers at Microsoft... <sigh>

Be well,

Mike Devour
silver-list owner

[Mike Devour, Citizen, Patriot, Libertarian]
[mdev...@eskimo.com                        ]
[Speaking only for myself...               ]


--
The silver-list is a moderated forum for discussion of colloidal silver.

To join or quit silver-list or silver-digest send an e-mail message to: 
silver-list-requ...@eskimo.com  -or-  silver-digest-requ...@eskimo.com
with the word subscribe or unsubscribe in the SUBJECT line.

To post, address your message to: silver-list@eskimo.com
Silver-list archive: http://escribe.com/health/thesilverlist/index.html
List maintainer: Mike Devour <mdev...@eskimo.com>