Guest guest Report post Posted June 12, 2006 http://www.pcworld.com/news/article/0,aid,126048,00.asp Worm Attacks E-Mail Mass-mailing worm exploits a vulnerability in the Web-based e-mail, but its impact is low. Jeremy Kirk, IDG News Service Monday, June 12, 2006 A mass-mail worm that exploits a vulnerability in 's Web-based e-mail is making the rounds but the impact appears to be low, security vendor Symantec said today. Advertisement document.write(pcw_AdRender('iframe','showcase-lg',undefined)); ','336','280','1','1',172968,104997,'0','426',0); " onclick= " pr_trk('ac',172968,1); " onmouseout= " clearTimeout(prhvr);if(typeof(prRoll)=='function')prBExit(event); " shape=RECT target=_new coords=169,53,331,277 href= " http://clk.atdmt.com/DEN/go/pcwrmopb0080001328den/direct/01/ " > var priid1='4D321A41-E431-404F-A180-15F65C0274BA';if(!document.getElementById('prscr\ ipt1')){var prss=document.createElement('script');prss.id='prscript1';prss.src='http://spd.p\ ointroll.com/PointRoll/Ads/PRScript.dll?v=93 & pos=1 & init=0 & delay=1 & push=0 & set=1 & b\ ye=1';document.getElementsByTagName('head')[0].appendChild(prss);} The worm, which Symantec calls JS.Yamanner@m, is different from others in that a user merely has to open the e-mail to cause it to run, said Kevin Hogan, senior manager for Symantec Security Response. Mass-mail worms have usually been contained in an attachment with an e-mail note encouraging a user to open it. The worm, written in JavaScript, takes advantage of a vulnerability that allows scripts embedded in HTML e-mail to run in the users' browsers. users should be able to modify their settings to block the zero-day exploit, Hogan said. Symantec rated the worm a Level 2 threat, one notch above its least harmful ranking. Hogan said the worm did not appear to be spreading widely, and he did not anticipate the threat level rising. How It Spreads When activated, the worms then sends itself to other users in the victim's address book who also use e-mail with the suffixes of @ or @. The worm mimics a function within 's Web mail called " Quickbuilder, " which allows a user to add contacts in an address book from received e-mail, Hogan said. The process, however, is transparent to the victim, he said. The harvested e-mail addresses are sent to a remote server. Users of Mail Beta do not appear to be affected, Symantec said. The worm also opens a browser that displays a Web page that does not appear to contain malicious content. Although 's Web e-mail has not been fixed, users are advised to update virus and firewall definitions and block any e-mail sent from av3. The subject line of the e-mail with the worm says " New Graphic Site, " and the body says " this is test. " officials could not immediately be reached for comment. Quote Share this post Link to post Share on other sites