Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


W32/Mydoom.AH - MEDIUM risk for IFRAME exploit

  • Please log in to reply
No replies to this topic

#1 harrywaldron


    Security Reporter

  • Members
  • 509 posts
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:03:15 AM

Posted 09 November 2004 - 06:38 AM

Overnight, a new AH version was released which is similar to the AG variant. This brand new version of MyDoom is HTML based and does not contain attachments.

It exploits a critical IE vulnerability when you click on a URL found in the email message. Please always avoid clicking on links in spam or unwanted email messages. There may be more variants coming as this one is easy to copy.

W32/Mydoom.AH - MEDIUM risk for IFRAME exploit

Internet Storm Report

This W32/Mydoom@MM variant makes use of a zero day attack targeting a Microsoft Internet Explorer IFRAME buffer overflow vulnerability. The virus spreads by sending email messages to addresses found on the local system. The message appears as follows:

From: Spoofed address (may be exchange-robot@paypal.com when sending paypal message body below)

Subject: (case may vary)


There is no attachment to the message. The homepage hyperlink points to the infected system which sent the email message. Clicking on the link, accesses a web server running on the compromised system. The web server serves HTML that contains IFRAME buffer overflow code to automatically execute the virus. Infected systems will show Internet Explorer listening on TCP Port 1639, the port the web server runs on. Information on the IFRAME vulnerability can be found here:

Internet Explorer IFRAME Buffer Overflow Vulnerability

EXAMPLE of PAYPAL message that's spreading

Congratulations! PayPal has successfully charged $175 to your credit card. Your order tracking number is A866DEC0, and your item will be shipped within three business days. To see details please click this link DO NOT REPLY TO THIS MESSAGE VIA EMAIL! This email is being sent by an automated message system and the reply will not be received. Thank you for using PayPal

AVERT STINGER - can remove this new variant

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users