Holiday Attacks Target IE Browser, PHP Servers

    Date28 Dec 2004
    CategoryHacks/Cracks
    7728
    Posted ByBrittany Day
    Malware authors on Christmas day left dubious "gift" packages in e-mailboxes across the Internet. Fresh attacks, which took advantage of old Internet Explorer bugs, as well as new versions of the Santy worm fouled the holidays for some Windows users and PHP server admins. A posting on the Full Disclosure mailing list described a new attack that can proceed without user intervention. Called "Microsoft Internet Explorer Full Remote Compromise w/o User Intervention," the exploit is based on old vulnerabilities in Internet Explorer in Windows XP SP2 (Service Pack 2).


    The provided analysis of the attack mentions two targets in SP2: the Help ActiveX control related topics zone security bypass vulnerability and the Help ActiveX control related topics cross site scripting vulnerability.

    The attack is described in detail and results in an arbitrary file being placed in the user's startup folder where it will be when the user restarts the system. According to the analysis, the attack does not lend itself to inclusion in a worm, but could be effectively used by spyware or adware to compromise a system.

    According to the post, the exploit was released by Michael Evanchik and Paul from Greyhats Security, to spur Microsoft Corp. to secure Windows and the Internet Explorer browser more quickly. The message from Paul, suggested Windows users switch to the Mozilla project's FireFox browser to improve security.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"5","type":"x","order":"1","pct":45.45,"resources":[]},{"id":"56","title":"No","votes":"6","type":"x","order":"2","pct":54.55,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.