Reports of Excel 0-Day
Microsoft has received a report of a new 0-day vulnerability involving Excel. They are currently investigating this issue and will issue more information on workarounds as it becomes available. They are currently blogging about it at http://blogs.technet.com/msrc/archive/2006/06/16/436174.aspx so check that site for more information as it becomes available.
In the meantime, we continue to recommend the same defenses we recommended with the Word 0-day from last month located at http://isc.sans.org/diary.php?storyid=1347. These very general best practices should help alleviate the danger until Microsoft releases a patch or more specific workarounds.
Update - We've recieved reports (Thanks Juha-Matti) that Symantec is detecting this attack.
Trojan.Mdropper.J is the detection for the malicious .xls which uses the 0-day exploit to drop Downloader.Booli.A.
The Symantec website also reports ..
We'll pass on more information as we receive it.
-Chris
In the meantime, we continue to recommend the same defenses we recommended with the Word 0-day from last month located at http://isc.sans.org/diary.php?storyid=1347. These very general best practices should help alleviate the danger until Microsoft releases a patch or more specific workarounds.
Update - We've recieved reports (Thanks Juha-Matti) that Symantec is detecting this attack.
Trojan.Mdropper.J is the detection for the malicious .xls which uses the 0-day exploit to drop Downloader.Booli.A.
The Symantec website also reports ..
Downloader.Booli.A may arrive on the compromised computer, dropped by Trojan.Mdropper.J, with the following name:
%System%\svc.exe
Note: %System% is a variable that refers to the System folder. By default this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
When Downloader.Booli.A is executed, it performs the following actions:
- Attempts to run Internet Explorer and inject its code into Internet Explorer to potentially bypass firewalls.
- Attempts to download a file from the following location:
[http://]210.6.90.153:7890/svcho[REMOVED]
Note: At the time of writing the remote file was not available. - Saves the file as the following and if the download was successful, executes the file:
c:\temp.exe - Creates an empty file before exiting:
c:\bool.ini
We'll pass on more information as we receive it.
-Chris
Keywords:
0 comment(s)
×
Diary Archives
Comments