Common Vulnerabilities and Exposures (CVE)number
CVE-2010-3333 Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability." .
CVE-2010-0188 Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors. (LibTIFF exploit)
General File Information
CVE-2010-3333
File ATT78214.doc
MD5 C31341DF029E6DC2804BA2F97DB7BAF7
SHA1 518ca81280f5bcf7ce98a6a262ac7d74ca261faf
File size : 1066411 bytes
Type: DOC
Distribution: Email attachment
CVE-2010-3333
File ATT27390.doc
MD5 b4e256982947b3c68aaa84545b61c9b1
SHA1 8a6aacaf1a3a741a4c0cf707dcc70ffaa9442fee
File size : 1066411 bytes
Type: DOC
Distribution: Email attachment
CVE-2010-0188
File ....pdf
MD5 92db03a6d1db9a9012ccc7bd9b45ed7a
SHA1 b92dd18baf2dc041062b1e862db05a4d097a2411
File size : 232743 bytes
Type: PDF
Distribution: Email attachment
Download
Original Message
-----
Subject: [!! SPAM] Fw: FW: 健康寶典
摘要:
一名糖尿病者無意中發現,龍鬚菜可以降低血糖,且告知同樣患有糖尿的一些朋友這個新發現 ,並一同嘗試, 經十幾天的試吃以及驗血,發現成果驚人以其中一位患者為例,本身已罹患糖尿達 20年之久,長期藥物控制並不見理想,即使吃藥血糖也高達300 多,但經4天皆食用龍鬚菜後 ,驗血報告指出血糖僅剩175..
龍鬚菜對身體很好
產期:集中於4∼10月,其他月份較少
產地:主要集中於花蓮縣花蓮市郊、吉安鄉、鳳林鎮
食用方法:食用嫩梢煮食
園藝性狀:為隼人瓜(佛手瓜)植株莖蔓之嫩梢約 15∼20公分 之部份,夏季在冷涼地區生產者可食部分較長,一般每隔3天(夏季)∼10 天(冬季)採收1次,採收後切除過長部份。龍鬚菜是一種物 美 價廉的農作物。其嫩部分食用,發現味美 可口,味道勝過果實,而嫩芽部分狀似龍鬚。龍鬚菜不需要使用農藥來防治病蟲害,可以安心食用,而且含有非常豐富的葉綠素,纖維質也很高,多食用可助消化,有利身體健康。
台中縣大里市大里里的一名 林姓 女士表示,她可能發現了控制糖尿病的新方法,希望能讓大家知道,造福廣大的糖尿病患者。 她本身是一名糖尿病者,在今年的4/13無意中發現,龍鬚菜可以降低血糖,且告知同樣患有糖尿的一些朋友這個新發現 ,並一同嘗試, 經十幾天的試吃以及驗血,發現成果驚人以其中一位患者為例,本身已罹患糖尿達 20年之久,長期藥物控制並不見理想,即使吃藥血糖也高達300 多,但經4天皆食用龍鬚菜後 ,驗血報告指出血糖僅剩175.
因此,若諸位受糖尿困擾已久,不妨可試試這個新方法,炒龍鬚菜來吃吃看 ,龍鬚菜不僅便宜也沒副作用。
Message Headers
Received: from msr8.hinet.net (HELO msr8.hinet.net) (168.95.4.108)
by XXXXXXXXXXXXXXXXX; 16 Dec 2010 00:53:36 -0000
Received: from jkbjg5faa68347 (mail.kaofu.com.tw [220.130.251.25])
by msr8.hinet.net (8.9.3/8.9.3) with SMTP id IAA09514;
Thu, 16 Dec 2010 08:43:02 +0800 (CST)
Message-ID: <002d01cb9cba$85c2d720$0c01a8c0@jkbjg5faa68347>
From: =?utf-8?B?5L+K5YKR?=
To:
Subject: =?utf-8?B?Rnc6IFshISBTUEFNXSAgRnc6IEZX77yaIOWBpeW6t+WvtuWFuA==?=
Date: Thu, 16 Dec 2010 08:45:15 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="----=_NextPart_000_0026_01CB9CFD.8F264520"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
Sender
220.130.251.25
Hostname: mail.kaofu.com.tw
ISP: CHTD, Chunghwa Telecom Co., Ltd.
Organization: Chunghwa Telecom Data Communication Business Group
Assignment: Static IP
Country: Taiwan
City: Kaohsiung
ISP: CHTD, Chunghwa Telecom Co., Ltd.
Organization: Chunghwa Telecom Data Communication Business Group
Assignment: Static IP
Country: Taiwan
City: Kaohsiung
Automated Scans
File name:ATT78214.dochttp://www.virustotal.com/file-scan/report.html?id=308ab831d924e8d3cc4d7b470e149b1b907437da5ba9daa377474d8a2efa51bb-1292989644
Submission date:2010-12-22 03:47:24 (UTC)
Result:7/ 43 (16.3%)
Antiy-AVL 2.0.3.7 2010.12.22 Exploit/MSWord.MS10-087
ClamAV 0.96.4.0 2010.12.22 BC.Exploit.CVE_2010_3333
Emsisoft 5.1.0.1 2010.12.22 Exploit.MSWord.MS10-087!IK
Ikarus T3.1.1.90.0 2010.12.22 Exploit.MSWord.MS10-087
Kaspersky 7.0.0.125 2010.12.22 Exploit.MSWord.MS10-087.a
TrendMicro 9.120.0.1004 2010.12.22 TROJ_ARTIEF.SM
TrendMicro-HouseCall 9.120.0.1004 2010.12.22 TROJ_ARTIEF.SM
Additional information
Show all
MD5 : c31341df029e6dc2804ba2f97db7baf7
SHA1 : 518ca81280f5bcf7ce98a6a262ac7d74ca261faf
File name:ATT27390.doc
http://www.virustotal.com/file-scan/report.html?id=ce9b3dd95dd9bb07505f8a2f3319887ff71fe66cf9eb1afa9b31b77c9904d122-1292644639
Submission date:2010-12-18 03:57:19 (UTC)
Result:7 /43 (16.3%)
Antiy-AVL 2.0.3.7 2010.12.18 Exploit/MSWord.MS10-087
ClamAV 0.96.4.0 2010.12.17 BC.Exploit.CVE_2010_3333
Emsisoft 5.1.0.1 2010.12.17 Exploit.MSWord.MS10-!IK
Ikarus T3.1.1.90.0 2010.12.17 Exploit.MSWord.MS10-
Kaspersky 7.0.0.125 2010.12.18 Exploit.MSWord.MS10-087.a
TrendMicro 9.120.0.1004 2010.12.18 TROJ_ARTIEF.SM
TrendMicro-HouseCall 9.120.0.1004 2010.12.18 TROJ_ARTIEF.SM
Additional information
Show all
MD5 : b4e256982947b3c68aaa84545b61c9b1
SHA1 : 8a6aacaf1a3a741a4c0cf707dcc70ffaa9442fee
File name:....pdf
http://www.virustotal.com/file-scan/report.html?id=2a0aa0de5b9f88f0cf46d49827ded597848bab76fe9a52b9c48007f45d9c0610-1292991048
Submission date:2010-12-22 04:10:48 (UTC)
Result:16 /43 (37.2%)
Avast 4.8.1351.0 2010.12.21 PDF:CVE-2010-0188
Avast5 5.0.677.0 2010.12.21 PDF:CVE-2010-0188
AVG 9.0.0.851 2010.12.22 Exploit_c.TLW
BitDefender 7.2 2010.12.22 Exploit.TIFF.Gen
Command 5.2.11.5 2010.12.22 CVE-0188
Comodo 7141 2010.12.21 UnclassifiedMalware
eTrust-Vet 36.1.8053 2010.12.21 PDF/CVE-2010-0188!exploit
F-Prot 4.6.2.117 2010.12.21 CVE-0188
F-Secure 9.0.16160.0 2010.12.22 Exploit.TIFF.Gen
GData 21 2010.12.22 Exploit.TIFF.Gen
Kaspersky 7.0.0.125 2010.12.22 Exploit.Win32.Pidief.dci
Microsoft 1.6402 2010.12.21 Exploit:Win32/Pdfjsc.gen!B
TrendMicro 9.120.0.1004 2010.12.22 TROJ_PDFKA.ZZ
TrendMicro-HouseCall 9.120.0.1004 2010.12.22 TROJ_PDFKA.ZZ
VBA32 3.12.14.2 2010.12.21 Exploit.Win32.Pidief.dci
ViRobot 2010.12.22.4213 2010.12.22 Trojan.Win32.S.EX-Pidief.232743
MD5 : 92db03a6d1db9a9012ccc7bd9b45ed7a
Other Files that came with the message:
File name:12.doc
Result: 0 /43 (0.0%)
MD5 : b93a2ec9abc32513d16722fa1b590244
File name:ATT24068.doc
Result: 0 /43 (0.0%)
MD5 : 8c6eb46d3cef926c0eacd5a9dc2a4c01
File name: ATT10019.doc
Result:0/ 41 (0.0%)
MD5 : 74fe5e7b233e420693c9d6da19283607
File name:ATT72822.doc
Result:0 /43 (0.0%)
MD5 : dde1ebf7e4af66e4712e903003b9a40d
File name:ATT38865.pps
Result:0 /43 (0.0%)
MD5 : b3caa33e69b2f88170a28f3f14f20496
File name:ATT75556.doc
Result:0 /43 (0.0%)
MD5 : eb1fc115ed77ea6af5e6ace6f0faa6d0
No comments:
Post a Comment