W32/Mydoom.AH - MEDIUM risk for IFRAME exploit
Overnight, a new AH version was released which is similar to the AG variant. This brand new version of MyDoom is HTML based and does not contain attachments.
It exploits a critical IE vulnerability when you click on a URL found in the email message. Please always avoid clicking on links in spam or unwanted email messages. There may be more variants coming as this one is easy to copy.
W32/Mydoom.AH - MEDIUM risk for IFRAME exploit http://secunia.com/virus_information/13223/mydoom.ah/
Internet Storm Report http://isc.sans.org//diary.php?date=2004-11-08
This W32/Mydoom@MM variant makes use of a zero day attack targeting a Microsoft Internet Explorer IFRAME buffer overflow vulnerability. The virus spreads by sending email messages to addresses found on the local system. The message appears as follows:
From: Spoofed address (may be firstname.lastname@example.org
when sending paypal message body below)
Subject: (case may vary)
blank There is no attachment to the message.
The homepage hyperlink points to the infected system which sent the email message. Clicking on the link, accesses a web server running on the compromised system. The web server serves HTML that contains IFRAME buffer overflow code to automatically execute the virus. Infected systems will show Internet Explorer listening on TCP Port 1639, the port the web server runs on. Information on the IFRAME vulnerability can be found here: Internet Explorer IFRAME Buffer Overflow Vulnerability http://secunia.com/advisories/12959/ EXAMPLE of PAYPAL message that's spreading
quote:AVERT STINGER - can remove this new variant http://vil.nai.com/vil/stinger
Congratulations! PayPal has successfully charged $175 to your credit card. Your order tracking number is A866DEC0, and your item will be shipped within three business days. To see details please click this link DO NOT REPLY TO THIS MESSAGE VIA EMAIL! This email is being sent by an automated message system and the reply will not be received. Thank you for using PayPal