Since I am pressed for time and am presently unable to completely digest
what the vulnerability is and how to stop it, how can we configure our
Declude installs to protect/find/stop these messages?

John T
eServices For You


> -----Original Message-----
> From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
> On Behalf Of Andy Schmidt
> Sent: Tuesday, May 31, 2005 11:30 AM
> To: Declude.Virus@declude.com
> Subject: [Declude.Virus] MS05-16 Exploit
> 
> Hi,
> 
> Enclosed a notice for the MS05-16 Exploit.
> 
> For the record:
> I'm actually in favor of using STRICT interpretation of vulnerabilities -
no
> matter how seldom one might actually occur.  Whether a violation of
> standards is due to an actual virus - or just a poor mass-mailer
> application, I gladly use the reason of "vulnerability" of a potential
virus
> to reject these messages early.
> 
> As far as some features suggested here:
> 
> - I do agree that it might be helpful for some people not to scan for
> viruses, if a vulnerability is found (to conserve CPU).
> 
> - I do agree that there is little reason (other than statistics) to run
the
> second scanner after the first scanner already found a virus.
> 
> - I do agree that it is desirable for some people, if there was an option
> that would delete vulnerabilities rather than "isolate" them in the Virus
> folder.
> 
> - I do NOT agree that Declude should NOT detect certain vulerabilities,
just
> because they only occur very rarely.
> 
> 
> Best Regards
> Andy Schmidt
> 
> Phone:  +1 201 934-3414 x20 (Business)
> Fax:    +1 201 934-9206
> 
> 
> > -----Original Message-----
> > From: Nick FitzGerald [mailto:[EMAIL PROTECTED]
> > Sent: Sunday, May 29, 2005 9:31 AM
> > To: Bugtraq@securityfocus.com
> > Subject: Spam exploiting MS05-016
> >
> 
> Yesterday at least two of my spam-traps received the following message
> (I've elided the MIME boundary values just in case...):
> 
>    Subject: We make a business offer to you
>    MIME-Version: 1.0
>    Content-type: multipart/mixed;
>            boundary="[...]"
> 
>    [...]
>    Content-Type: text/plain;
>            charset="Windows-1252"
>    Content-Transfer-Encoding: 8bit
> 
>    Hello!  It is not spam, so don't delete this message.
>    We have a business offer to you.
>    Read our offer.
>    You can increase the business in 1,5 times.
>    We hope you do not miss this information.
> 
> 
>    Best regards, Keith
> 
>    [...]
>    Content-type: application/octet-stream;
>            name="agreement.zip"
>    Content-Transfer-Encoding: base64
>    Content-Disposition: attachment;
>            filename="agreement.zip"
> 
>    <<encoded ZIP file data>>
> 
> There are a few trivial differences between the messages to the
> different addresses I checked, so don't anyone try to turn the above
> into a totally literal filtering rule...
> 
> Anyway, the "agreement.zip" attachment held only one file, apparently
> called "agreement.txt", but on closer inspection it turned out the file
> was called "agreement.txt " where the apparent trailing space was
> actually a 0xFF character.  This "pseudo-TXT" file was, in fact, an
> OLE2 format file (originally a Word document file) with the OLE2 Root
> Entry CLSID set to that of the Microsoft HTML Application Host (MSHTA).
> This was all done as per the description in the iDEFENSE advisory
> announcing this vulnerability:
> 
>    http://www.idefense.com/application/poi/display?id=231&type=vulns
> 
> This "pseudo-TXT" file is an example of what is produced by the PoC
> generator posted to Bugtraq.  Oddly, that message is not archived in
> SecurityFocus' own mailing list archives, but its PoC code is listed
> with the vulnerability's BID entry:
> 
>    http://www.securityfocus.com/bid/13132/info/
> 
> That PoC may be identified from the comment at the top of its code:
> 
>    MS05-016 POC
>    Made By ZwelL
>    [EMAIL PROTECTED]
>    2005.4.13
> 
> Anyway, the "agreement.txt " file contained a script to write a text
> file with commands and responses for use with the Windows ftp client
> via its "-s" option and further commands to run ftp with those scripted
> 
> commands and then to run the executable that ftp script would cause to
> be downloaded from a Russian web site.  At the time of writing, that
> site is still up and the executable that is downloaded (a backdoor) is
> the same one that was there when the spam was first seen.
> 
> If you haven't installed the MS05-016 Windows Shell patch yet:
> 
>    http://www.microsoft.com/technet/security/bulletin/ms05-016.mspx
> 
> or at least taken reasonable precautions to defang possible
> exploitation of this vulnerability (particularly through MSHTA), it
> would be  advisable to do so now.  When initially discovered, only two
> of more than 20 tested virus scanning engines detected the exploit in
> "agreement.txt ".  Since alerting the antivirus developer community of
> the field discovery of this exploit, a couple more "big name" scanners
> have added a degree of detection for this exploit, and I expect that
> number to grow as the new week dawns and new updates are pushed to
> customers.
> 
> 
> --
> Nick FitzGerald
> Computer Virus Consulting Ltd.
> Ph/FAX: +64 3 3267092
> 
> 
> ---
> This E-mail came from the Declude.Virus mailing list.  To
> unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
> type "unsubscribe Declude.Virus".    The archives can be found
> at http://www.mail-archive.com.

---
This E-mail came from the Declude.Virus mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.Virus".    The archives can be found
at http://www.mail-archive.com.

Reply via email to