Jump to content
IndiaDivine.org
Sign in to follow this  
Guest guest

worm

Rate this topic

Recommended Posts

Guest guest

http://www.pcworld.com/news/article/0,aid,126048,00.asp

 

Worm Attacks E-Mail

 

Mass-mailing worm exploits a vulnerability in the Web-based e-mail, but its

impact is low.

Jeremy Kirk, IDG News Service

Monday, June 12, 2006

A mass-mail worm that exploits a vulnerability in 's Web-based e-mail is

making the rounds but the impact appears to be low, security vendor Symantec

said today.

Advertisement

document.write(pcw_AdRender('iframe','showcase-lg',undefined));

 

 

 

 

 

 

 

 

','336','280','1','1',172968,104997,'0','426',0); "

onclick= " pr_trk('ac',172968,1); "

onmouseout= " clearTimeout(prhvr);if(typeof(prRoll)=='function')prBExit(event); "

shape=RECT target=_new coords=169,53,331,277

href= " http://clk.atdmt.com/DEN/go/pcwrmopb0080001328den/direct/01/ " > var

priid1='4D321A41-E431-404F-A180-15F65C0274BA';if(!document.getElementById('prscr\

ipt1')){var

prss=document.createElement('script');prss.id='prscript1';prss.src='http://spd.p\

ointroll.com/PointRoll/Ads/PRScript.dll?v=93 & pos=1 & init=0 & delay=1 & push=0 & set=1 & b\

ye=1';document.getElementsByTagName('head')[0].appendChild(prss);}

The worm, which Symantec calls JS.Yamanner@m, is different from others in that

a user merely has to open the e-mail to cause it to run, said Kevin Hogan,

senior manager for Symantec Security Response. Mass-mail worms have usually been

contained in an attachment with an e-mail note encouraging a user to open it.

The worm, written in JavaScript, takes advantage of a vulnerability that

allows scripts embedded in HTML e-mail to run in the users' browsers.

users should be able to modify their settings to block the zero-day exploit,

Hogan said.

Symantec rated the worm a Level 2 threat, one notch above its least harmful

ranking. Hogan said the worm did not appear to be spreading widely, and he did

not anticipate the threat level rising.

 

How It Spreads

When activated, the worms then sends itself to other users in the victim's

address book who also use e-mail with the suffixes of @ or

@. The worm mimics a function within 's Web mail called

" Quickbuilder, " which allows a user to add contacts in an address book from

received e-mail, Hogan said. The process, however, is transparent to the victim,

he said.

The harvested e-mail addresses are sent to a remote server. Users of

Mail Beta do not appear to be affected, Symantec said.

The worm also opens a browser that displays a Web page that does not appear to

contain malicious content.

Although 's Web e-mail has not been fixed, users are advised to update

virus and firewall definitions and block any e-mail sent from av3. The

subject line of the e-mail with the worm says " New Graphic Site, " and the body

says " this is test. "

officials could not immediately be reached for comment.

 

 

 

 

 

 

 

 

 

Share this post


Link to post
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
Sign in to follow this  

×
×
  • Create New...