Re: ICQ remote buffer overflow vulnerability

From: Nick FitzGerald (nick@virus-l.demon.co.uk)
Date: Mon Jan 07 2002 - 19:18:10 PST

  • Next message: Jim Knoble: "Re: IE https certificate attack"

    Daniel Tan <datanat_private> wrote:
    
    > Until AOL announces a patch/workaround, it is highly recommended to
    > restrict receiving of events (other than normal messages) to
    > contacts you know.
    
    This is just like the old, and equally bogus, "advice" for preventing 
    being hit by mass mailing viruses -- "don't open attachments from 
    people you don't know".  The implication taken from such advice is 
    that attachments from people you do know are necessarily "safe".
    
    Better advice is to implement a method that prevents receipt of such 
    requests (or upgrade to the version thought unaffected by the bug).
    
    
    -- 
    Nick FitzGerald
    Computer Virus Consulting Ltd.
    Ph/FAX: +64 3 3529854
    



    This archive was generated by hypermail 2b30 : Tue Jan 08 2002 - 14:17:09 PST