• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

Viruses attached to JPEG files

Status
Not open for further replies.

pestul

Member
http://news.bbc.co.uk/1/hi/technology/3661678.stm

Critical update available. Effects IE, MS Office & other MS software suites. Blocked in SP2, however other (list on link) MS software suites installed with SP2 can still be vulnerable. Firefox is unaffected.

Oh.. the method of delivery is somewhat unique, so popular virus scanners might not pick up on it yet.
 

jenov4

Member
I'm a Firefox user myself, but it's not immune to security breaches. 10 vulnerabilities was mentioned yesterday:

http://secunia.com/advisories/12526/

1) Various boundary errors in "nsMsgCompUtils.cpp" can be exploited to cause heap-based buffer overflows when a specially crafted e-mail is forwarded.

Successful exploitation can potentially lead to execution of arbitrary code.

2) Insufficient restrictions on script generated events on text fields can be exploited to read and write content from and to the clipboard.

etc etc..
 

Deg

Banned
jenov4 said:
I'm a Firefox user myself, but it's not immune to security breaches. 10 vulnerabilities was mentioned yesterday:

http://secunia.com/advisories/12526/

1) Various boundary errors in "nsMsgCompUtils.cpp" can be exploited to cause heap-based buffer overflows when a specially crafted e-mail is forwarded.

Successful exploitation can potentially lead to execution of arbitrary code.

2) Insufficient restrictions on script generated events on text fields can be exploited to read and write content from and to the clipboard.

etc etc..

Now take the next step. Get Opera.
 

Matlock

Banned
125.JPG


THIS IS JUST AN ORDINARY .JPG

OR IS IT
 

Killthee

helped a brotha out on multiple separate occasions!
jenov4 said:
I'm a Firefox user myself, but it's not immune to security breaches. 10 vulnerabilities was mentioned yesterday:

http://secunia.com/advisories/12526/

1) Various boundary errors in "nsMsgCompUtils.cpp" can be exploited to cause heap-based buffer overflows when a specially crafted e-mail is forwarded.

Successful exploitation can potentially lead to execution of arbitrary code.

2) Insufficient restrictions on script generated events on text fields can be exploited to read and write content from and to the clipboard.

etc etc..

1.0 PR fixes all of them...
 
Status
Not open for further replies.
Top Bottom