__/ [ Erik Funkenbusch ] on Sunday 29 April 2007 10:22 \__
> On Sun, 29 Apr 2007 04:52:04 +0100, Roy Schestowitz wrote:
>
>> Experts warn of .doc attacks
>>
>> ,----[ Quote
>>| When the document is opened it crashes the system and the malware
>>| is automatically loaded when the computer reboots.
>> `----
>>
>> http://www.computing.co.uk/vnunet/news/2188613/experts-warn-doc-attacks
>
> As usual, your fraudulent headlines are once again a complete and total
> lie.
>
> This article is not about "The consequences of 'View=Execute'", it's the
> consequences of buffer overflows in parsing code.
>
> 'View=Execute' is when applications and data are treated the same by the
> shell, launching a document is indiscernable from running the application.
>
> These are different concepts. The document can execute the arbitrary code
> whether or not you loaded it via the shell or file->Open. As such, arguing
> that this is the consequences of a paradigm which has nothing to do with
> the flaw is not only disingenuous, it's an outright lie.
.doc files are a menace because of macros. How about that?
--
~~ Best regards
Roy S. Schestowitz | "This sig seemed like a good idea at the time..."
http://Schestowitz.com | GNU/Linux ¦ PGP-Key: 0x74572E8E
Mem: 514480k total, 482148k used, 32332k free, 12168k buffers
http://iuron.com - next generation of search paradigms
|
|