Not necessarily. This exploit might be useful in HTML formatted email. And, once compromised, it would be relatively easy to install a daemon/server that would provide the download link for all email sent by that particular system.
Which does occastionally happen like Code Red, but typically require "worm" like propogation, not "virus" like the current SCO attack.
No, Novarg/MyDoom is a worm that uses email and p2p to propagate. It exploits breaches in security and user psychology, rather than piggy-backing on other programs.
Viruses insert themselves into legitimate programs, just like biological viruses insert their DNA into a cellular organism. Before the 'Net, viruses were spread in boot sectors of floppies or shareware being passed from person to person. They are relatively rare, these days.
It might, but what's the point, if you're in their inbox you're in their inbox.
And, once compromised, it would be relatively easy to install a daemon/server that would provide the download link for all email sent by that particular system.
There's a lot of holes in that theory. From dial in clients? Behind firewalls? Forget those working in your scheme right off the bat.
Novarg/MyDoom is a worm that uses email and p2p to propagate. It exploits breaches in security and user psychology, rather than piggy-backing on other programs.
It may be technically classified by some as a worm because of it's complexity, but it's still at it's heart an e-mail virus that requires user interaction to propogate. If you're running illegal software like Kazaa that's their problem. A more traditional "worm" is one that propogates competely by itself, exploiting something like a buffer overflow on an always on host.