Jump to content


Please note: You can easily log in to MPN using your Facebook account!

...remedied


Recommended Posts

The link in the thread that contained a auto executing virus when you opened the page has now been deleted and the situation remedied. Move along!!! Nothing to see here. :D

 

If anyone got hit with it to where NAV didn't detect it, or the IE was not current; here is the security notice....

MHTMLRedir.Exploit

Discovered on: December 11, 2003

Last Updated on: April 24, 2004 12:13:33 PM

 

 

 

 

 

 

 

This threat allows a malicious Web site to download and execute programs on your computer.

 

 

 

 

 

 

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Systems Not Affected: Linux, Macintosh, OS/2, UNIX

 

 

 

 

 

Virus Definitions (Intelligent Updater) *

December 12, 2003

 

 

Virus Definitions (LiveUpdate) **

December 17, 2003

 

 

*

Intelligent Updater definitions are released daily, but require manual download and installation.

Click here to download manually.

 

**

LiveUpdate virus definitions are usually released every Wednesday.

Click here for instructions on using LiveUpdate.

 

 

 

 

Wild:

 

Number of infections: 0 - 49

Number of sites: 0 - 2

Geographical distribution: Low

Threat containment: Easy

Removal: Easy

Threat Metrics

 

 

Wild:

Low

Damage:

Low

Distribution:

Low

 

 

 

Damage

 

Payload Trigger: N/A

Payload: N/A

Large scale e-mailing: N/A

Deletes files: N/A

Modifies files: N/A

Degrades performance: N/A

Causes system instability: N/A

Releases confidential info: N/A

Compromises security settings: N/A

Distribution

 

Subject of email: N/A

Name of attachment: N/A

Size of attachment: N/A

Time stamp of attachment: N/A

Ports: N/A

Shared drives: N/A

Target of infection: N/A

 

This threat contains specially-crafted, HTML code that can download and execute programs without prompting you. This threat only affects Microsoft Internet Explorer.

 

When visiting a Web page or receiving an HTML email that contains this threat, a file can be downloaded and executed. Under normal conditions, Internet Explorer would prompt you before allowing any executable content to be downloaded and executed on the system. This vulnerability in Internet Explorer allows specially crafted HTML to bypass this security prompt.

 

This detection prevents HTML files containing this vulnerability from being executed.

 

Microsoft has released patch MS04-013 to address this issue.

 

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

 

Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.

If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.

Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.

Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.

Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.

Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

 

Because this is an exploit only, there are no removal instructions, since there is nothing to remove. This is a detection for the exploit, preventing the execution of malicious content on your computer. By detecting the exploit, it is prevented from running.

 

 

 

Revision History:

 

April 24, 2004: Added link to the Microsoft patch which addresses this vulnerability.

 

 

 

Write-up by: Atli Gudmundsson

 

 

 

 

 

Link to comment
Share on other sites



  • Replies 1
  • Created
  • Last Reply

Erm...RTFA.

 

This threat contains specially-crafted, HTML code that can download and execute programs without prompting you. This threat only affects Microsoft Internet Explorer.

- - - -

Because this is an exploit only, there are no removal instructions, since there is nothing to remove. This is a detection for the exploit, preventing the execution of malicious content on your computer. By detecting the exploit, it is prevented from running.

It's alerting you to an open exploit because of a hole in Windows. If your security patches are up to date, then this alert means nothing - and I suspect you probably wouldn't even see it (I didn't, and I have NAV as well). Likewise, if you don't use IE then you should be safe.

 

It does not neccessarily mean, however, that there is an evil virus waiting to kill your PC. Only that it is possible.

 

Of course, this is my favorite part:

Systems Not Affected: Linux, Macintosh, OS/2, UNIX

:D

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...