lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: pappgeza at tolna.net (Papp Geza)
Subject: old bug - new wired

Hello FitzGerald

2004. febru?r 2., 2:33:09, ?rtad:

This  is good.
New virus is - example Explorer bug (old bug)

Microsoft Security Bulletin MS02-015  Print
28 March 2002 Cumulative Patch for Internet Explorer
Originally posted: March 28, 2002 
Updated: May 09, 2003
W32/Eyeveg-B is a password stealing Trojan and network worm.
The worm may arrive in an HTML file that exploits a Microsoft Internet Explorer vulnerability which allows the worm to be executed. 

For further information on this vulnerability and for details on how to protect/patch the computer against such attacks please see Microsoft security bulletin
MS02-015. 

When first run, W32/Eyeveg-B copies itself to the Windows System folder using a random filename and adds its pathname to the following registry entry so that it is run automatically each time the computer is started: 

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ 


-- 
?dv?zlettel,
  Geysap                             mailto:pappgeza@...na.net

www.gyik.com
"VIRUS CORE TEAM"
====================================
Fiat justitia, pereat mundus!
------------------------------------
we protect your digital worlds... 
====================================

















 

 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ