Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

W32/Mydoom.ag@MM - Zero Day IE I-FRAME Attack


  • Please log in to reply
No replies to this topic

#1 harrywaldron

harrywaldron

    Security Reporter


  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:09:21 PM

Posted 08 November 2004 - 04:57 PM

This brand new version of MyDoom is HTML based and does not contain attachments. It also exploits a critical IE vulnerability, so AV protection plus best practices are needed -- as this one has some potential.

W32/Mydoom.ag@MM - Zero Day IE I-FRAME Attack
http://secunia.com/virus_information/13213/mydoom.ag/
http://vil.nai.com/vil/content/v_129630.htm

This W32/Mydoom@MM variant makes use of a zero day attack targeting a Microsoft Internet Explorer IFRAME buffer overflow vulnerability. The virus spreads by sending email messages to addresses found on the local system. The message appears as follows:

From: Spoofed address
Subject: may vary

* funny photos :thumbsup:
* hello
* hey!
* blank

There is no attachment to the message. The homepage hyperlink points to the infected system which sent the email message. Clicking on the link, accesses a web server running on the compromised system. The web server serves HTML that contains IFRAME buffer overflow code to automatically execute the virus. Infected systems will show Internet Explorer listening on TCP Port 1639, the port the web server runs on. Information on the IFRAME vulnerability can be found here:

Internet Explorer IFRAME Buffer Overflow Vulnerability
http://secunia.com/advisories/12959/

BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users