Wednesday, December 15, 2010

Dec 15 CVE-2010-3333 DOC, CVE-2010-0188 PDF Health Tips Collection from jackey870@yahoo.com.tw

Common Vulnerabilities and Exposures (CVE)number

CVE-2010-3333 Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability." .

CVE-2010-0188 Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  (LibTIFF exploit)

  General File Information

CVE-2010-3333

File      ATT78214.doc
MD5   C31341DF029E6DC2804BA2F97DB7BAF7
SHA1  518ca81280f5bcf7ce98a6a262ac7d74ca261faf
File size :  1066411 bytes
Type:  DOC
Distribution: Email attachment 

CVE-2010-3333

File      ATT27390.doc
MD5   b4e256982947b3c68aaa84545b61c9b1
SHA1  8a6aacaf1a3a741a4c0cf707dcc70ffaa9442fee
File size :  1066411 bytes
Type:  DOC
Distribution: Email attachment 

CVE-2010-0188

File ....pdf
MD5   92db03a6d1db9a9012ccc7bd9b45ed7a
SHA1  b92dd18baf2dc041062b1e862db05a4d097a2411

File size :  232743 bytes
Type:  PDF
Distribution: Email attachment




Download

Original Message


-----
Subject: [!! SPAM] Fw: FW: 健康寶典
摘要:
一名糖尿病者無意中發現,龍鬚菜可以降低血糖,且告知同樣患有糖尿的一些朋友這個新發現 ,並一同嘗試, 經十幾天的試吃以及驗血,發現成果驚人以其中一位患者為例,本身已罹患糖尿達 20年之久,長期藥物控制並不見理想,即使吃藥血糖也高達300 多,但經4天皆食用龍鬚菜後 ,驗血報告指出血糖僅剩175..

龍鬚菜對身體很好
產期:集中於4∼10月,其他月份較少
產地:主要集中於花蓮縣花蓮市郊、吉安鄉、鳳林鎮
食用方法:食用嫩梢煮食
園藝性狀:為隼人瓜(佛手瓜)植株莖蔓之嫩梢約 15∼20公分 之部份,夏季在冷涼地區生產者可食部分較長,一般每隔3天(夏季)∼10 天(冬季)採收1次,採收後切除過長部份。龍鬚菜是一種物 美 價廉的農作物。其嫩部分食用,發現味美 可口,味道勝過果實,而嫩芽部分狀似龍鬚。龍鬚菜不需要使用農藥來防治病蟲害,可以安心食用,而且含有非常豐富的葉綠素,纖維質也很高,多食用可助消化,有利身體健康。
台中縣大里市大里里的一名 林姓 女士表示,她可能發現了控制糖尿病的新方法,希望能讓大家知道,造福廣大的糖尿病患者。 她本身是一名糖尿病者,在今年的4/13無意中發現,龍鬚菜可以降低血糖,且告知同樣患有糖尿的一些朋友這個新發現 ,並一同嘗試, 經十幾天的試吃以及驗血,發現成果驚人以其中一位患者為例,本身已罹患糖尿達 20年之久,長期藥物控制並不見理想,即使吃藥血糖也高達300 多,但經4天皆食用龍鬚菜後 ,驗血報告指出血糖僅剩175.
因此,若諸位受糖尿困擾已久,不妨可試試這個新方法,炒龍鬚菜來吃吃看 ,龍鬚菜不僅便宜也沒副作用。

 

Message Headers

Received: (qmail 10259 invoked from network); 16 Dec 2010 00:53:36 -0000
Received: from msr8.hinet.net (HELO msr8.hinet.net) (168.95.4.108)
  by XXXXXXXXXXXXXXXXX; 16 Dec 2010 00:53:36 -0000
Received: from jkbjg5faa68347 (mail.kaofu.com.tw [220.130.251.25])
    by msr8.hinet.net (8.9.3/8.9.3) with SMTP id IAA09514;
    Thu, 16 Dec 2010 08:43:02 +0800 (CST)
Message-ID: <002d01cb9cba$85c2d720$0c01a8c0@jkbjg5faa68347>
From: =?utf-8?B?5L+K5YKR?=
To:
Subject: =?utf-8?B?Rnc6IFshISBTUEFNXSAgRnc6IEZX77yaIOWBpeW6t+WvtuWFuA==?=
Date: Thu, 16 Dec 2010 08:45:15 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
    boundary="----=_NextPart_000_0026_01CB9CFD.8F264520"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180

Sender

220.130.251.25
Hostname:    mail.kaofu.com.tw
ISP:    CHTD, Chunghwa Telecom Co., Ltd.
Organization:    Chunghwa Telecom Data Communication Business Group
Assignment:    Static IP
Country:    Taiwan
City:    Kaohsiung



Automated Scans

File name:ATT78214.doc
http://www.virustotal.com/file-scan/report.html?id=308ab831d924e8d3cc4d7b470e149b1b907437da5ba9daa377474d8a2efa51bb-1292989644
Submission date:2010-12-22 03:47:24 (UTC)
Result:7/ 43 (16.3%)
Antiy-AVL    2.0.3.7    2010.12.22    Exploit/MSWord.MS10-087
ClamAV    0.96.4.0    2010.12.22    BC.Exploit.CVE_2010_3333
Emsisoft    5.1.0.1    2010.12.22    Exploit.MSWord.MS10-087!IK
Ikarus    T3.1.1.90.0    2010.12.22    Exploit.MSWord.MS10-087
Kaspersky    7.0.0.125    2010.12.22    Exploit.MSWord.MS10-087.a
TrendMicro    9.120.0.1004    2010.12.22    TROJ_ARTIEF.SM
TrendMicro-HouseCall    9.120.0.1004    2010.12.22    TROJ_ARTIEF.SM
Additional information
Show all
MD5   : c31341df029e6dc2804ba2f97db7baf7
SHA1  : 518ca81280f5bcf7ce98a6a262ac7d74ca261faf

File name:ATT27390.doc
http://www.virustotal.com/file-scan/report.html?id=ce9b3dd95dd9bb07505f8a2f3319887ff71fe66cf9eb1afa9b31b77c9904d122-1292644639
Submission date:2010-12-18 03:57:19 (UTC)
Result:7 /43 (16.3%)
Antiy-AVL     2.0.3.7     2010.12.18     Exploit/MSWord.MS10-087
ClamAV     0.96.4.0     2010.12.17     BC.Exploit.CVE_2010_3333
Emsisoft     5.1.0.1     2010.12.17     Exploit.MSWord.MS10-!IK
Ikarus     T3.1.1.90.0     2010.12.17     Exploit.MSWord.MS10-
Kaspersky     7.0.0.125     2010.12.18     Exploit.MSWord.MS10-087.a
TrendMicro     9.120.0.1004     2010.12.18     TROJ_ARTIEF.SM
TrendMicro-HouseCall     9.120.0.1004     2010.12.18     TROJ_ARTIEF.SM
Additional information
Show all
MD5   : b4e256982947b3c68aaa84545b61c9b1
SHA1  : 8a6aacaf1a3a741a4c0cf707dcc70ffaa9442fee

File name:....pdf
http://www.virustotal.com/file-scan/report.html?id=2a0aa0de5b9f88f0cf46d49827ded597848bab76fe9a52b9c48007f45d9c0610-1292991048
Submission date:2010-12-22 04:10:48 (UTC)
Result:16 /43 (37.2%)
Avast     4.8.1351.0     2010.12.21     PDF:CVE-2010-0188
Avast5     5.0.677.0     2010.12.21     PDF:CVE-2010-0188
AVG     9.0.0.851     2010.12.22     Exploit_c.TLW
BitDefender     7.2     2010.12.22     Exploit.TIFF.Gen
Command     5.2.11.5     2010.12.22     CVE-0188
Comodo     7141     2010.12.21     UnclassifiedMalware
eTrust-Vet     36.1.8053     2010.12.21     PDF/CVE-2010-0188!exploit
F-Prot     4.6.2.117     2010.12.21     CVE-0188
F-Secure     9.0.16160.0     2010.12.22     Exploit.TIFF.Gen
GData     21     2010.12.22     Exploit.TIFF.Gen
Kaspersky     7.0.0.125     2010.12.22     Exploit.Win32.Pidief.dci
Microsoft     1.6402     2010.12.21     Exploit:Win32/Pdfjsc.gen!B
TrendMicro     9.120.0.1004     2010.12.22     TROJ_PDFKA.ZZ
TrendMicro-HouseCall     9.120.0.1004     2010.12.22     TROJ_PDFKA.ZZ
VBA32     3.12.14.2     2010.12.21     Exploit.Win32.Pidief.dci
ViRobot     2010.12.22.4213     2010.12.22     Trojan.Win32.S.EX-Pidief.232743
MD5   : 92db03a6d1db9a9012ccc7bd9b45ed7a

Other Files that came with the message:
File name:12.doc
Result: 0 /43 (0.0%)
MD5   : b93a2ec9abc32513d16722fa1b590244

File name:ATT24068.doc
Result: 0 /43 (0.0%)
MD5   : 8c6eb46d3cef926c0eacd5a9dc2a4c01

File name: ATT10019.doc
Result:0/ 41 (0.0%)
MD5   : 74fe5e7b233e420693c9d6da19283607

File name:ATT72822.doc
Result:0 /43 (0.0%)
MD5   : dde1ebf7e4af66e4712e903003b9a40d

File name:ATT38865.pps
Result:0 /43 (0.0%)
MD5   : b3caa33e69b2f88170a28f3f14f20496

File name:ATT75556.doc
Result:0 /43 (0.0%)
MD5   : eb1fc115ed77ea6af5e6ace6f0faa6d0

No comments:

Post a Comment