ani Posted August 7, 2004 Share Posted August 7, 2004 The link in the thread that contained a auto executing virus when you opened the page has now been deleted and the situation remedied. Move along!!! Nothing to see here. If anyone got hit with it to where NAV didn't detect it, or the IE was not current; here is the security notice.... MHTMLRedir.Exploit Discovered on: December 11, 2003 Last Updated on: April 24, 2004 12:13:33 PM This threat allows a malicious Web site to download and execute programs on your computer. Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP Systems Not Affected: Linux, Macintosh, OS/2, UNIX Virus Definitions (Intelligent Updater) * December 12, 2003 Virus Definitions (LiveUpdate) ** December 17, 2003 * Intelligent Updater definitions are released daily, but require manual download and installation. Click here to download manually. ** LiveUpdate virus definitions are usually released every Wednesday. Click here for instructions on using LiveUpdate. Wild: Number of infections: 0 - 49 Number of sites: 0 - 2 Geographical distribution: Low Threat containment: Easy Removal: Easy Threat Metrics Wild: Low Damage: Low Distribution: Low Damage Payload Trigger: N/A Payload: N/A Large scale e-mailing: N/A Deletes files: N/A Modifies files: N/A Degrades performance: N/A Causes system instability: N/A Releases confidential info: N/A Compromises security settings: N/A Distribution Subject of email: N/A Name of attachment: N/A Size of attachment: N/A Time stamp of attachment: N/A Ports: N/A Shared drives: N/A Target of infection: N/A This threat contains specially-crafted, HTML code that can download and execute programs without prompting you. This threat only affects Microsoft Internet Explorer. When visiting a Web page or receiving an HTML email that contains this threat, a file can be downloaded and executed. Under normal conditions, Internet Explorer would prompt you before allowing any executable content to be downloaded and executed on the system. This vulnerability in Internet Explorer allows specially crafted HTML to bypass this security prompt. This detection prevents HTML files containing this vulnerability from being executed. Microsoft has released patch MS04-013 to address this issue. Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices": Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates. If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied. Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services. Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised. Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files. Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media. Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched. Because this is an exploit only, there are no removal instructions, since there is nothing to remove. This is a detection for the exploit, preventing the execution of malicious content on your computer. By detecting the exploit, it is prevented from running. Revision History: April 24, 2004: Added link to the Microsoft patch which addresses this vulnerability. Write-up by: Atli Gudmundsson Link to comment Share on other sites More sharing options...
Franknputer Posted August 7, 2004 Share Posted August 7, 2004 Erm...RTFA. This threat contains specially-crafted, HTML code that can download and execute programs without prompting you. This threat only affects Microsoft Internet Explorer. - - - - Because this is an exploit only, there are no removal instructions, since there is nothing to remove. This is a detection for the exploit, preventing the execution of malicious content on your computer. By detecting the exploit, it is prevented from running. It's alerting you to an open exploit because of a hole in Windows. If your security patches are up to date, then this alert means nothing - and I suspect you probably wouldn't even see it (I didn't, and I have NAV as well). Likewise, if you don't use IE then you should be safe. It does not neccessarily mean, however, that there is an evil virus waiting to kill your PC. Only that it is possible. Of course, this is my favorite part: Systems Not Affected: Linux, Macintosh, OS/2, UNIX Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.