07-20-2004, 07:05 PM
|
|
|
FBOP Class Of 2013
Industry Role:
Join Date: Jan 2004
Location: bumfuck, ky
Posts: 35,562
|
Quote:
Originally posted by DonovanPhillips
And what the fuck is this shit??

That's popped up twice in the last 5 minutes on CJ pages.
|
Quote:
Trojan Characteristics:
-- Update June 24, 2004--
It has recently been made known that some IIS servers have been remotely hacked. This exploit was utilized to redirect the client's browser to the location http://217.107.218.147 containing an infected webpage causing unsolicited files to be downloaded and executed.
Certain downloaded files are detected as BackDoor-AXJ.dll , JS/Exploit-DialogArg.b , and VBS/Psyme with the current DAT files, while others are new variants of these threats and require the DAILY DAT files for detection to occur.
For further details concerning this threat, and details of available Microsoft patches see:
http://www.microsoft.com/security/in...load_ject.mspx
-- Update June 10, 2004 --
The risk assessment of this threat has been updated to Low-Profiled due to media attention at:
http://news.com.com/Pop-up+toolbar+s...l?tag=nefd.top
A new attack vector was discovered recently, which by passes the MS04-013 patch. Generic detection of this new exploit code will be included in the 4366 DAT release.
|
|
|
|