반응형
이제 그만좀 나왔으면 ....
원본 보기 : http://www.securityfocus.com/bid/33870/discuss
Microsoft Excel is prone to a remote code-execution vulnerability.
Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file.
Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.
Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file.
Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.
원본보기 : http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99&tabid=2
It then drops the following file:
%Temp%\rundll.exe (a copy of Downloader)
The Trojan may then attempt to download more files on to the compromised computer from the following locations:
%Temp%\rundll.exe (a copy of Downloader)
The Trojan may then attempt to download more files on to the compromised computer from the following locations:
- [http://]61.59.24.55/sb.php?id=[19 RANDOM ASCII CHARACTERS]
- [http://]61.59.24.45/sb.php?id=[19 RANDOM ASCII CHARACTERS]
- [http://]61.221.40.63/sb.php?id=[19 RANDOM ASCII CHARACTERS]
댓글