MESSAGE
DATE | 2001-12-05 |
FROM | Ruben Safir
|
SUBJECT | Subject: [hangout] Fwd: Update for Quarantining Malicious Outlook Attachments [conover@rahul.net]
|
From owner-hangout-desteny-at-mrbrklyn.com Wed Dec 5 01:49:54 2001 Received: from mail.rm-cpa.com (mail.rm-cpa.com [216.112.229.114]) by www2.mrbrklyn.com (8.11.2/8.11.2/SuSE Linux 8.11.1-0.5) with ESMTP id fB56nsY27806 for ; Wed, 5 Dec 2001 01:49:54 -0500 Received: from www2.mrbrklyn.com (dsl254-112-136.nyc1.dsl.speakeasy.net [216.254.112.136]) by mail.rm-cpa.com (8.9.3/8.9.3) with ESMTP id BAA23586; Wed, 5 Dec 2001 01:45:45 -0500 Received: (from mdom-at-localhost) by www2.mrbrklyn.com (8.11.2/8.11.2/SuSE Linux 8.11.1-0.5) id fB56hYM27730 for hangout-desteny; Wed, 5 Dec 2001 01:43:34 -0500 Received: from www2 (localhost [127.0.0.1]) by www2.mrbrklyn.com (8.11.2/8.11.2/SuSE Linux 8.11.1-0.5) with ESMTP id fB56hXY27725 for ; Wed, 5 Dec 2001 01:43:33 -0500 Date: Wed, 5 Dec 2001 01:43:33 -0500 From: Ruben Safir To: hangout-at-nylxs.com Subject: [hangout] Fwd: Update for Quarantining Malicious Outlook Attachments [conover-at-rahul.net] Message-ID: <20011205014333.E27658-at-www2.mrbrklyn.com> References: <20011205020048.10703.qmail-at-rahul.net> Mime-Version: 1.0 Content-Type: text/plain; format=flowed; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit In-Reply-To: <20011205020048.10703.qmail-at-rahul.net>; from conover-at-rahul.net on Tue, Dec 04, 2001 at 21:00:49 -0500 X-Mailer: Balsa 1.2.3 Sender: owner-hangout-at-mrbrklyn.com Precedence: bulk Reply-To: Ruben Safir List: New Yorkers Linux Scene Admin: To unsubscribe send unsubscribename-at-domian.com to hangout-request-at-www2.mrbrklyn.com X-Keywords: X-UID: 19519 Status: RO Content-Length: 1544 Lines: 49
On 2001.12.04 21:00:49 -0500 John Conover wrote: The procmail(1) script fragment:
http://www.johncon.com/john/archive/quarantine.outlook.attachments.txt
which quarantines e-mail with potentially malicious Microsoft Outlook(r) attachments at:
http://www.johncon.com/john/QuarantineAttachments/
was updated to handle some potential Novell GroupWise vulnerabilities.
Although there are no known active exploits, the update is advisable, whether GroupWise is used, or not.
John
BTW, it concerned an RFC1521'ism, Paragraph 7.4.1.
--
John Conover Tel. 408.370.2688 conover-at-rahul.net 631 Lamont Ct. Fax. 408.379.9602 http://www.johncon.com/ Campbell, CA 95008 Cel. 408.772.7733
_______________________________________________ procmail mailing list procmail-at-lists.RWTH-Aachen.DE http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail
-- __________________________
Brooklyn Linux Solutions __________________________ http://www.mrbrklyn.com - Consulting http://www.brooklynonline.com - For the love of Brooklyn http://www.nylxs.com - Leadership Development in Free Software http://www.nyfairuse.org - The foundation of Democracy http://www2.mrbrklyn.com/resources - Unpublished Archive or stories and articles from around the net http://www2.mrbrklyn.com/mp3/annie.mp3 - Armed and Dangerous.... http://www2.mrbrklyn.com/downtown.html - See the New Downtown Brooklyn....
1-718-382-5752
____________________________ New Yorker Linux Users Scene Fair Use - because it's either fair use or useless....
|
|