Security Basics mailing list archives
Re: Analyzing Suspicious Attachment
From: Ansgar -59cobalt- Wiechers <bugtraq () planetcobalt net>
Date: Fri, 18 Jan 2008 18:54:27 +0100
On 2008-01-17 Richard Golodner wrote:
Why do you allow .zip onto your network anyway? Danger Will Robinson.
Not allowing .zip files will not solve the problem, because people will just rename the file to *.aaa or something. Either you allow attachments (what kind doesn't matter, really) or you don't allow attachments. If you do allow attachments, then you'll have to deal with the risk of malware coming into your network via that route. Disallowing particular suffixes will not mitigate this risk. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq
Current thread:
- Re: Remote desktop access policy, (continued)
- Re: Remote desktop access policy Kurt Buff (Jan 19)
- Re: Analyzing Suspicious Attachment Geoffrey Gowey (Jan 17)
- Re: Analyzing Suspicious Attachment Ali, Saqib (Jan 17)
- Re: Analyzing Suspicious Attachment brian . bevers (Jan 17)
- RE: Analyzing Suspicious Attachment Nick Vaernhoej (Jan 17)
- RE: Analyzing Suspicious Attachment Timmothy Lester (Jan 17)
- RE: Analyzing Suspicious Attachment Richard Golodner (Jan 18)
- Re: Analyzing Suspicious Attachment Josh Haft (Jan 18)
- RE: Analyzing Suspicious Attachment Petter Bruland (Jan 18)
- Re: Analyzing Suspicious Attachment Lee Hinman (Jan 18)
- RE: Analyzing Suspicious Attachment Richard Golodner (Jan 18)
- Re: Analyzing Suspicious Attachment Ansgar -59cobalt- Wiechers (Jan 18)