There were some additional file names that can be executed under MS
Outlook added to:
http://www.johncon.com/john/QuarantineAttachments/
a few days ago. With the filename spoofing that some unpatched
versions of Outlook still have, the malicious HTML detection is still
overly aggressive-you can remove it if you want.
Some configuration would probably be required, depending on what you
want to do with a message that has potentially malicious code.
John
mm0ckr(_at_)btinternet(_dot_)com writes:
Does anyone have any suggestions on filtering out potential viral
attatchments?
--
John Conover, conover(_at_)rahul(_dot_)net
http://www.johncon.com/
_______________________________________________
procmail mailing list
procmail(_at_)lists(_dot_)RWTH-Aachen(_dot_)DE
http://MailMan.RWTH-Aachen.DE/mailman/listinfo/procmail