It's is set of by sites that are trying to CHANGE THE HOMEPAGE and/or AUTO-BOOKMARK!
"In many cases, the applet may perform simple actions, such as changing your Internet Explorer home page."
Those bastards...
Download the Microsoft patch from
http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/security/b ulletin/ms00-081.asp
It sets off my anti-virus too.
Here's my log....
Date: 15/10/01, Time: 15:58:56, on R4L1Z3
The file
C:\WINDOWS\Temporary Internet Files\Content.IE5\W6V2BP2J\index[2].htm
is infected with the JS.Exception.Exploit virus.
Unable to repair this file.
Date: 15/10/01, Time: 15:59:06, on R4L1Z3
The file
C:\WINDOWS\Temporary Internet Files\Content.IE5\W6V2BP2J\index[2].htm
is infected with the JS.Exception.Exploit virus.
Unable to quarantine this file.
Date: 15/10/01, Time: 15:59:12, on R4L1Z3
The file
C:\WINDOWS\Temporary Internet Files\Content.IE5\W6V2BP2J\index[2].htm
is infected with the JS.Exception.Exploit virus.
Unable to delete this file.
Date: 15/10/01, Time: 15:59:22, on R4L1Z3
The file
C:\WINDOWS\Temporary Internet Files\Content.IE5\W6V2BP2J\index[2].htm
is infected with the JS.Exception.Exploit virus.
Access to the file was denied.
Virus Name: JS.Exception.Exploit
Aliases:
Infects: N/A
Likelihood: Common
Length: 666 bytes
Memory Resident? No
Size Stealth? No
Full Stealth? No
Triggered Event? No
Encrypting? No
Polymorphic? No
Comments
No additional information
Discovered on: August 16, 2001
Last Updated on: August 29, 2001 at 05:30:24 PM PDT
JS.Exception.Exploit is an exploit which allows unpatched systems to run arbitrary code if a Java applet that was programmed to take advantage of the exploit is allowed to run. In many cases, the applet may perform simple actions, such as changing your Internet Explorer home page. It can also be programmed to run code to perform a mass mailing, as in the case of VBS.Loding.A@mm.
Type: Trojan Horse
Virus Definitions: August 16, 2001
Threat Assessment:
Wild: Low
Damage: Low
Distribution: Low
Number of infections: 0 - 49
Number of sites: 3 - 9
Geographical distribution: Medium
Threat containment: Easy
Removal: Easy
Technical description:
The structure of the code is specific and involves the illegal use of the Applet tag. The exploit was published in at least one security forum. More information about this vulnerability is available at Microsoft's Technet site:
http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/security/b ulletin/ms00-075.asp
Removal instructions:
1. Run LiveUpdate to make sure that you have the most recent virus definitions.
2. Start Norton AntiVirus (NAV), and run a full system scan. Be sure that NAV is configured to scan all files.
3. Delete all files that are detected as JS.Exception.Exploit.
Additional information:
Microsoft has released a patch which closes the security vulnerability exploit. You can download the patch from the following Microsoft site:
http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/security/b ulletin/ms00-081.asp
For a comprehensive list of vulnerabilities, see the following Microsoft Web page:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsoluti ons/security/current.asp
[This message has been edited by ldinternet (edited 10-15-2001).]