[Dshield] Fw: Last Network Critical Patch

Micheal Patterson micheal at tsgincorporated.com
Wed Apr 28 07:53:00 GMT 2004

Yet another bogus MS notice. This came with html and all the nice things
that would fool a user into thinking it was the real deal. I didn't get the
attachment as it had been stripped at some point upstream. However, just in
case I'll let you folks know it's out there.


Micheal Patterson
Network Administration
TSG Incorporated

---------------------- original headers ----------------

Return-Path: <jvaistine at takas.lt>
Received: from mail.takas.lt (mail-src.takas.lt [])
 by smtp2.tsgincorporated.com (8.12.11/8.12.9) with ESMTP id i3S66jNM001410
 for <micheal at tsgincorporated.com>; Wed, 28 Apr 2004 01:06:45 -0500 (CDT)
 (envelope-from jvaistine at takas.lt)
thread-index: AcQs5vSvgL2TN+ySQTu7jLYf6V0pRg==
Content-Transfer-Encoding: 7bit
Content-Class: urn:content-classes:message
Importance: normal
Priority: normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1409
Content-Type: multipart/related;
Received: from bghxlfa ([]) by mail.takas.lt with Microsoft
SMTPSVC(5.0.2195.6713); Wed, 28 Apr 2004 09:06:13 +0300
From: "MS Technical Support" <aarmdptphnkst-yteg at confidence.net>
To: "MS Partner" <riki_kgaibjfvz at confidence.net>
Subject: Last Network Critical Patch
MIME-Version: 1.0
Message-ID: <ISPFE84xJY4FJ6IFhnh0000d108 at mail.takas.lt>
X-OriginalArrivalTime: 28 Apr 2004 06:06:13.0853 (UTC)
Date: 28 Apr 2004 09:06:13 +0300
X-Virus-Scanned: by amavisd-new
X-Spam-Checker-Version: SpamAssassin 2.63 (2004-01-11) on
X-Spam-Status: No, hits=-2.9 required=3.8 tests=BAYES_00,
 RCVD_IN_BL_SPAMCOP_NET autolearn=no version=2.63
X-UIDL: e1;!!m?U"!U9,#!&]p"!
Status: RO

----- Original Message ----- 
From: "MS Technical Support" <aarmdptphnkst-yteg at confidence.net>
To: "MS Partner" <riki_kgaibjfvz at confidence.net>
Sent: Wednesday, April 28, 2004 1:06 AM
Subject: Last Network Critical Patch

Microsoft Partner

this is the latest version of security update, the
"April 2004, Cumulative Patch" update which resolves
all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express
as well as three newly discovered vulnerabilities.
Install now to protect your computer
from these vulnerabilities, the most serious of which could
allow an malicious user to run code on your computer.
This update includes the functionality of all previously released patches.

System requirements: Windows 95/98/Me/2000/NT/XP
This update applies to:
 - MS Internet Explorer, version 4.01 and later
 - MS Outlook, version 8.00 and later
 - MS Outlook Express, version 4.01 and later

Recommendation: Customers should install the patch at the earliest
How to install: Run attached file. Choose Yes on displayed dialog box.
How to use: You don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support web site.

For security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site

Thank you for using Microsoft products.

Please do not reply to this message.
It was sent from an unmonitored e-mail address and we are unable to respond
to any replies.

The names of the actual companies and products mentioned herein are the
trademarks of their respective owners.
Copyright 2004 Microsoft Corporation.

Attachment removed: Suspicious file extension (.exe). File name:
q161768.exe, content type: application/x-msdownload

More information about the list mailing list