Jump to content


Please note: You can easily log in to MPN using your Facebook account!

PSA-Don't Ever Get This Drunk


Recommended Posts



  • Replies 7
  • Created
  • Last Reply

NAV caught it on mine TOO; fortunately it did because I had not made it far enough down the page to read other responses to the initial post prior to clicking the link.

 

Here is NAV's security response from Symantec:

 

MHTMLRedir.Exploit

Discovered on: December 11, 2003

Last Updated on: April 24, 2004 12:13:33 PM

 

 

 

 

 

 

 

This threat allows a malicious Web site to download and execute programs on your computer.

 

 

 

 

 

 

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Systems Not Affected: Linux, Macintosh, OS/2, UNIX

 

 

 

 

 

Virus Definitions (Intelligent Updater) *

December 12, 2003

 

 

Virus Definitions (LiveUpdate) **

December 17, 2003

 

 

*

Intelligent Updater definitions are released daily, but require manual download and installation.

Click here to download manually.

 

**

LiveUpdate virus definitions are usually released every Wednesday.

Click here for instructions on using LiveUpdate.

 

 

 

 

Wild:

 

Number of infections: 0 - 49

Number of sites: 0 - 2

Geographical distribution: Low

Threat containment: Easy

Removal: Easy

Threat Metrics

 

 

Wild:

Low

Damage:

Low

Distribution:

Low

 

 

 

Damage

 

Payload Trigger: N/A

Payload: N/A

Large scale e-mailing: N/A

Deletes files: N/A

Modifies files: N/A

Degrades performance: N/A

Causes system instability: N/A

Releases confidential info: N/A

Compromises security settings: N/A

Distribution

 

Subject of email: N/A

Name of attachment: N/A

Size of attachment: N/A

Time stamp of attachment: N/A

Ports: N/A

Shared drives: N/A

Target of infection: N/A

 

This threat contains specially-crafted, HTML code that can download and execute programs without prompting you. This threat only affects Microsoft Internet Explorer.

 

When visiting a Web page or receiving an HTML email that contains this threat, a file can be downloaded and executed. Under normal conditions, Internet Explorer would prompt you before allowing any executable content to be downloaded and executed on the system. This vulnerability in Internet Explorer allows specially crafted HTML to bypass this security prompt.

 

This detection prevents HTML files containing this vulnerability from being executed.

 

Microsoft has released patch MS04-013 to address this issue.

 

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

 

Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.

If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.

Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.

Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.

Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.

Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

 

Because this is an exploit only, there are no removal instructions, since there is nothing to remove. This is a detection for the exploit, preventing the execution of malicious content on your computer. By detecting the exploit, it is prevented from running.

 

 

 

Revision History:

 

April 24, 2004: Added link to the Microsoft patch which addresses this vulnerability.

 

 

 

Write-up by: Atli Gudmundsson

 

 

 

 

 

Link to comment
Share on other sites

Sorry for the virus' folks.

What I have is the actual .wmv file I downloaded from an e-mail I recieved.

What I did was post the link to the origin of the video clip that was in the e-mail.

I scanned the .wmv file with Virex, it came up clean, (I also scanned my HD, it came up clean), so I posted the video clip to my website, which I probably should have done in the first place, and corrected the link in my first post.

 

So, if you want to still check out the video click above or click here, Don\'t Ever Get This Drunk .

 

Sly :cool:

Whasineva ehaiz, ehissgot ta be Funky!
Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...