lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F7C2625.7020508@jackhammer.org>
From: pdt at jackhammer.org (Paul Tinsley)
Subject: Mystery DNS Changes

Ya, there is a tiny line on page 3 of the security buleten that says 
that it doesn't fix the Object Type Vulnerability.  Awful nice of them 
to let people know...

Also they haven't commited to a date that a working patch will be 
available, end of October is the best I have heard.

To make it worse all the AV vendors are basing their signatures off of 
the AOLFIX.EXE instead of the behavior that allows the problem.  So v1.1 
will have no problem making it through the gates.

And Microsofts mitigation suggestions are to set ActiveX to prompt in 
the Intranet and Internet zones... right, cause end users aren't already 
trained to hit yes to every box that shows up.

Randal, Phil wrote:

>NAI has this as QHosts-1, and says MS03-032 does NOT protect against it:
>
>  http://vil.nai.com/vil/content/v_100719.htm
>
>Cheers,
>
>Phil
>
>---------------------------------------------
>Phil Randal
>Network Engineer
>Herefordshire Council
>Hereford, UK 
>
>  
>
>>-----Original Message-----
>>From: Joe Stewart [mailto:jstewart@...hq.com]
>>Sent: 01 October 2003 21:34
>>To: full-disclosure-orig@...sys.com
>>Cc: full-disclosure@...ts.netsys.com
>>Subject: Re: [Full-Disclosure] Mystery DNS Changes
>>
>>
>>On Wednesday 01 October 2003 03:19 pm, Hansen, Kevin wrote:
>>    
>>
>>>We have seen multiple instances where DHCP enabled workstations have
>>>had their DNS reconfigured to point to two of the three addresses
>>>listed below. Can anyone else confirm this? Incidents.org is
>>>reporting an increase in port 53 traffic over the last two days. Are
>>>we looking at the precursor to the next worm?
>>>
>>>216.127.92.38
>>>69.57.146.14
>>>69.57.147.175
>>>      
>>>
>>The top DNS server change was made by a newer variant of the 
>>Delude/Startpage trojan. It used to add bogus entries in the 
>>system32\drivers\etc\hosts file, but lately has begun to change the 
>>user's DNS registry settings as well. It hijacks the user's 
>>traffic to 
>>and from major search engines, redirecting it to a single webserver 
>>under the control of the trojan author. Any requested search 
>>pages have 
>>popup ads for gambling/porn site registration, presumably because the 
>>trojan author is getting money for registrations via affiliate 
>>programs.
>>
>>It is being installed via the MS03-032 IE object tag exploit. 
>>A scan of 
>>the system may not turn up any infected files - this trojan does not 
>>run at startup, and deletes its files after the DNS/hosts 
>>configuration 
>>changes are complete.
>>
>>-Joe
>>
>>-- 
>>Joe Stewart, GCIH 
>>Senior Security Researcher
>>LURHQ Corporation
>>http://www.lurhq.com/
>>_______________________________________________
>>Full-Disclosure - We believe in it.
>>Charter: http://lists.netsys.com/full-disclosure-charter.html
>>
>>    
>>
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
>  
>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ