This morning I received an Email from (above)
I have had Windows XP Professional installed on my Mac under a windows emulator in the past. However, I removed the emulator some time ago, and all vestiges thereof, including WXPP.
I have never! (over a span of several years) had an Email from M$ about any of the thousands of vulnerabilities in Windows XP or IE or other.
Now this comes along. When I enter the URL as specified in my URL field, I get the following screen message:
"The system cannot find the file specified."
The text of the message was:
________________________________
From: Department of safety a microsoft<security@microsoft.com
Date: Mon, 05 Jun 2006 14:44:49 +0200
To: myemailaddress
Subect: Microsoft Windows Explorer Remote Code Execution Vulnerability
A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to take complete control of an affected system. This flaw is due to an error in Windows Explorer that does not properly handle certain COM objects, which could be exploited by remote attackers to execute arbitrary commands by convincing a user to visit a web page that could force a connection to a remote file server containing specially crafted files and directories that invoke malicious code.
Affected Products
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 1
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Solution
Apply patches :
(The URL was:) htttp/www.m$.com/patches/patch=ms04685.exe (intentionally mis-spelled)
_________________
It sure sounds bogus to me.
The following is the Raw Source:
-------------------------------------------------
From security@microsoft.com Mon Jun 5 10:07:37 2006
Return-path: <httpd@wnx-11.seeweb.it>
Received: from ms-mta-01 (ms-mta-01 [10.24.14.215])
by ms-mss-02.columbus.rr.com
(iPlanet Messaging Server 5.2 HotFix 2.10 (built Dec 26 2005))
with ESMTP id <0J0E00AZS0QSAQ@ms-mss-02.columbus.rr.com> for
jwenrick@neo.rr.com; Mon, 05 Jun 2006 08:44:52 -0400 (EDT)
Received: from clmboh-mx-11.mgw.rr.com (clmboh-mx-11.mgw.rr.com [65.24.7.65])
by ms-mta-01.columbus.rr.com
(iPlanet Messaging Server 5.2 HotFix 2.10 (built Dec 26 2005))
with ESMTP id <0J0E00CQO0QK0X@ms-mta-01.columbus.rr.com> for
jwenrick@neo.rr.com (ORCPT jwenrick@neo.rr.com); Mon,
05 Jun 2006 08:44:52 -0400 (EDT)
Received: from wnx-11.seeweb.it ([212.25.170.81]) by clmboh-mx-11.mgw.rr.com
with ESMTP; Mon, 05 Jun 2006 08:44:51 -0400
Received: from wnx-11.seeweb.it (localhost [127.0.0.1])
by wnx-11.seeweb.it (8.12.3/8.12.3/Debian-6.6) with ESMTP id k55CinXd009959
for <jwenrick@neo.rr.com>; Mon, 05 Jun 2006 14:44:49 +0200
Received: (from httpd@localhost) by wnx-11.seeweb.it (8.12.3/8.12.3/Debian-6.6)
id k55CinLW009955; Mon, 05 Jun 2006 14:44:49 +0200
Date: Mon, 05 Jun 2006 14:44:49 +0200
From: Department of safety a microsoft <security@microsoft.com>
Subject: Microsoft Windows Explorer Remote Code Execution Vulnerability
To: jwenrick@neo.rr.com
Message-id: <200606051244.k55CinLW009955@wnx-11.seeweb.it>
MIME-version: 1.0
Content-type: text/html; charset=iso-8859-1
Original-recipient: rfc822;jwenrick@neo.rr.com
A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to take complete control of an affected system. This flaw is due to an error in Windows Explorer that does not properly handle certain COM objects, which could be exploited by remote attackers to execute arbitrary commands by convincing a user to visit a web page that could force a connection to a remote file server containing specially crafted files and directories that invoke malicious code. <br> <br>
Affected Products <br>
Microsoft Windows 2000 Service Pack 4 <br>
Microsoft Windows XP Service Pack 1 <br>
Microsoft Windows XP Service Pack 2 <br>
Microsoft Windows XP Professional x64 Edition <br>
Microsoft Windows Server 2003 <br>
Solution <br>
Apply patches : <br>
<a href="
http://www.domestictunerz.com/lang/en/patch-ms04685.exe" onmouseout="window.status=""" onmouseover="window.status="
http://www.microsoft.com/patches/patch-ms04685.exe";return true">
http://www.microsoft.com/patches/patch-ms04685.exe</a>
-----------------------------------------------
Weirdoooooo!
Jack