• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

anyone else got an email from MS about a security patch?

EmperorNero

Golden Member
attached to the email is a file named "26705-i386-update.exe" the email (below) looks professional and the newest virus updates showed no positive. I have never seen MS attach a litte program so either someone who's very creative sent me some kind of malicious app that the newest virus updates can't catch yet or it's a legitimate email and the security flaw is so major that MS had to send everyone a patch.


the complete header is (edited out personal info):
-----------------
From support@microsoft.com Sun Feb 11 17:43:47 2001
Received: from [123.456.789.130] by hotmail.com (3.2) with ESMTP id MHotMailBC508A5F008ED82197A0D5F7848213700; Sun Feb 11 17:41:53 2001
Received: from orion3 (orion3.ieway.com [209.211.199.62])
by srv.lantech.ru (8.9.3/8.9.3) with SMTP id EAA25948
for <asdfasdfasdf@hotmail.com>; Mon, 12 Feb 2001 04:43:50 +0300
From: support@microsoft.com
To: <asdfasdfsda@hotmail.com>
Subject: New critical update
Date: Sun, 11 Feb 2001 18:13:10 -0000
Message-Id: <36933.759151377315000.1521660@localhost>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary=lcghidsjcetocnfs
-------------








the email:
Microsoft Security Bulletin (MS01-001)
Patch Available for &quot;Web Client NTLM Authentication&quot; Vulnerability

Originally posted: January 11, 2001

Summary
Microsoft has released a patch that eliminates a security vulnerability in a
component that ships with Microsoft® Office 2000, Windows 2000, and Windows
Me. The vulnerability could, under certain circumstances, allow a malicious user
to obtain cryptographically protected logon credentials from another user when
requesting an Office document from a web server.
Frequently asked questions regarding this vulnerability and the patch can be
found at http://www.microsoft.com/technet/security/bulletin/fq01-001.asp

Issue
The Web Extender Client (WEC) is a component that ships as part of Office 2000,
Windows 2000, and Windows Me. WEC allows IE to view and publish files via
web folders, similar to viewing and adding files in a directory through Windows
Explorer. Due to an implementation flaw, WEC does not respect the IE Security
settings regarding when NTLM authentication will be performed - instead, WEC
will perform NTLM authentication with any server that requests it. If a user
established a session with a malicious user's web site - either by browsing to
the site or by opening an HTML mail that initiated a session with it - an
application on the site could capture the user's NTLM credentials. The malicious
user could then use an offline brute force attack to derive the password or, with
specialized tools, could submit a variant of these credentials in an attempt to
access protected resources.
The vulnerability would only provide the malicious user with the
cryptographically protected NTLM authentication credentials of another user. It
would not, by itself, allow a malicious user to gain control of another user's
computer or to gain access to resources to which that user was authorized
access. In order to leverage the NTLM credentials (or a subsequently cracked
password), the malicious user would have to be able to remotely logon to the
target system. However, best practices dictate that remote logon services be
blocked at border devices, and if these practices were followed, they would
prevent an attacker from using the credentials to logon to the target system.

Affected Software Versions
Microsoft Office 2000
Microsoft Windows 2000
Microsoft Windows Me
Patch Availability
Microsoft Office 2000 (All Platforms):
http://officeupdate.microsoft.com/2000/downloaddetails/wecsec.htm
Microsoft Windows 2000 (Without Office 2000):
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26889
Microsoft Windows Me (Without Office 2000):
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26705
Note: Since the affected component ships with the above products independent of
Office 2000, we have provided patches for affected systems that may not be
running Office 2000. As discussed in the FAQ, the patch and vulnerability only
affect machines running Internet Explorer 5.0 or later with Web Folders enabled.

Note: This patch will be included in Windows 2000 Service Pack 2.

Note Additional security patches are available at the Microsoft Download Center

More Information
Please see the following references for more information related to this issue.

Frequently Asked Questions: Microsoft Security Bulletin MS01-001,
http://www.microsoft.com/technet/security/bulletin/fq01-001.asp
Microsoft Knowledge Base article Q282132,
http://www.microsoft.com/technet/support/kb.asp?ID=282132
Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft Product
Support Services is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments
Microsoft thanks the following people for working with us to protect customers:

David Litchfield of @stake.
Matt Scarborough (matt.scarborough@gte.net)
Revisions
January 11, 2001: Bulletin Created.
January 15, 2001: Correction to Acknowledgement section.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED &quot;AS IS&quot; WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
 
DON'T OPEN IT!

Look at the header:

Received: from orion3 (orion3.ieway.com [209.211.199.62])

That is certainly not microsoft. As a matter of fact, ieway.com is an ISP. I would forward this message to abuse@ieway.com and notify hotmail/microsoft about it as well.
 
Interesting, because &quot;http://209.211.199.62&quot; brings up an MS Webpage, or at least what looks like an MS webpage. Still, I'd say call up MS and double check this, it seems unlikely that MS would send these out to everyone affected.

Zenmervolt
 
ieway is not my isp. I was suspicious of that header so that's why I posted it. but then again, a long time ago when MS was holding the winme sweepstakes, someone did a whois search on a domain name and it didn't match microsoft's but it was a legitimate sweepstakes. so could this be it too? but I'm gonna stay on the safe side and not open it. if it is a virus/trojan/whatever, I gotta give credit to the bastard for making it so real (even the links in the email are real).
 
no, 209.211.199.62 is not microsoft! it tracerts to orion3.ieway.com deffinately dont open it and notify ieway
 
Also notice this:

Received: from orion3 (orion3.ieway.com [209.211.199.62])
by srv.lantech.ru (8.9.3/8.9.3) with SMTP id EAA25948

This is DEFINITELY NOT Microsoft... 🙂

BTW, the 209.211.199.62 address is just a webserver running IIS 4.0 that hasn't been set up properly...

Dave
 
Spamcop says this:

Received: from orion3 (orion3.ieway.com [209.211.199.62]) by srv.lantech.ru (8.9.3/8.9.3) with SMTP id EAA25948 for
<asdfasdfasdf@hotmail.com>; Mon, 12 Feb 2001 04:43:50 +0300
Possible spammer: 209.211.199.62
&quot;nslookup 62.199.211.209.dul.maps.vix.com.&quot; (checking ip) [show] not found
&quot;nslookup orion3.ieway.com&quot; (checking ip) [show] ip not found; orion3.ieway.com discarded as fake.
&quot;dig orion3.ieway.com mx&quot; (digging for Mail eXchanger) [show] Can't find mailserver.
&quot;dig ieway.com mx&quot; (digging for Mail eXchanger) [show] Can't find mailserver.
Taking name from IP...
&quot;nslookup 209.211.199.62&quot; (getting name) [show] 209.211.199.62 = orion3.ieway.com
&quot;nslookup orion3.ieway.com&quot; (checking ip) [show] ip not found; orion3.ieway.com discarded as fake.
&quot;dig orion3.ieway.com mx&quot; (digging for Mail eXchanger) [show] Can't find mailserver.
&quot;dig ieway.com mx&quot; (digging for Mail eXchanger) [show] Can't find mailserver.
&quot;dig mx orion3.ieway.com&quot; (digging for Mail eXchanger) [show] 209.211.199.62 is not MX for orion3.ieway.com
&quot;nslookup 62.199.211.209.rbl.maps.vix.com.&quot; (checking ip) [show] not found
&quot;nslookup 62.199.211.209.inputs.orbs.org.&quot; (checking ip) [show] not found
Received line partially untrusted

Tracking message source:209.211.199.62:
&quot;nslookup 209.211.199.62&quot; (getting name) [show] 209.211.199.62 = orion3.ieway.com
&quot;nslookup orion3.ieway.com&quot; (checking ip) [show] ip not found; orion3.ieway.com discarded as fake.
&quot;nslookup orion3.ieway.com&quot; (checking ip) [show] ip not found; orion3.ieway.com discarded as fake.
getRoutesEmail:3520317246, 17 keys:'0,209,209.211,209.211.199,209.211.199.62'
&quot;dig -x 209.211.199 soa &quot; (digging for Start Of Authority) [show] - not found
&quot;whois 209.211.199.62@whois.arin.net&quot; (Asking arin for coordinator) [show] Checking NETBLK-INTEREXP-1
&quot;whois NETBLK-INTEREXP-1@whois.arin.net&quot; (Asking arin for coordinator) [show] Arin contact:jeffs@ieway.com

Statistics:
jeffs@ieway.com score:0
209.211.199.62 score:0
 
wow..that was prompt: I sent the email late last night to MS and got a reply this morning...but it was too sparse and doesn't have enough info about the &quot;hoax&quot; :|

------------------------------------

Hello and thanks for writing to microsoft.com.

The e-mail you have received is a known hoax. Microsoft does not send updates to customers in the form of executable e-mail attachments.
You may want to turn off any features that automatically launch the programs you download or that automatically open e-mail attachments. Be aware that although an e-mail cannot infect your computer, if you open an infected executable attachment from that e-mail message, it can infect your computer.

I am also including links to some helpful information on viruses:

http://www.microsoft.com/windows98/usingwindows/maintaining/tips/advanced/virus.asp

http://ciac.llnl.gov/ciac/CIACVirusDatabase.html

Again, thank you for bringing this to our attention.
Sincerely,
Glenn
microsoft.com Customer Support
 
I got it a few days ago. I didn't even look at the headers etc, I just deleted it right off the bat == Microsoft would NEVER send out an email with an executable attachment for 'fixes'.
 
Just curious: Have virus's been sent as attatchments that were not executable type files ? Say Screensaver files or something like that ? Or are they all .exe or .com etc. ??
 
Back
Top