Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

How often are IE security holes exploited?
From: "Richard M. Smith" <rms () computerbytesman com>
Date: Thu, 12 Dec 2002 16:32:42 -0500

Hi,

Has anyone ever looked into how often security holes in Internet
Explorer are actually used in viruses, worms, Trojan horses, and other
malware?  My sense is that very few of them are actually used in the
wild.  The KaK and Klez worms both use IE security holes to do their
dirty work, but most other Windows viruses seem to rely on social
engineering and standard features of Microsoft products.

If folks know of other malware that make use of IE security holes,
please let me know.  I'm putting together a little list.

Thanks,
Richard M. Smith
http://www.ComputerBytesMan.com


#################################################################
#################################################################
#################################################################
#####
#####
#####
#################################################################
#################################################################
#################################################################
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault