Last Updated: 2007-12-03 01:36:14 UTC
by Maarten Van Horenbeeck (Version: 2)
Symantec is reporting an active exploit site for the QuickTime RTSP Response vulnerability described in CVE-2007-6166. Currently, the malicious stream is hosted at port 554 on the server 184.108.40.206. Upon exploitation, the following executables are downloaded:
hxxp:// 1800-search.com /000/loader.exe
hxxp:// 1800-search.com /000/dnslvc.exe
Both files are universally detected by anti virus, so this is a relatively badly executed attack. Since no vendor supplied patch is currently available, we still recommend following US-CERT's recommendations:
- Setting the kill bit for the following Quicktime CLSIDs for Internet Explorer:
- Disabling the QuickTime plug-in for Mozilla browsers;
- Disable QuickTime file associations;
- Filter traffic on the common RTSP ports (554/tcp and 6970-6999/udp). This provides only partial mitigation.
Each of these does make the use of valid Quicktime content next to impossible, so please be aware of the impact this may have on your organization.
This specific attack instance can be blocked by disallowing traffic to the following domains and IP addresses:
220.127.116.11 (a seeder URL to this exploit, also hosting other IE exploits)
Maarten Van Horenbeeck