AVERT Threat Advisory: New Exploit-WMF code posted and being spammed
Advisory
AVERT is releasing this advisory to make our customers aware of new Exploit-WMF code having been released today and currently being used in spam attacks resulting in the installation of a new Backdoor-CEP variant.
Justification
Updated DAT files to detect new Exploit-WMF and Backdoor-CEP variants are being prepared now and will be released shortly.
Read About It
Information about Exploit-WMF is located on VIL at: vil.nai.com/vil/content/v_125294.htm
Detection
New Exploit-WMF and Backdoor-CEP variants have been discovered on 1/1/2006 (GMT) and detection will be added to the 4664 dat files (Release Date: 1/1/2006). The EXTRA.DAT is available at https://www.webimmune.net/extra/getextra.aspx.
If you suspect you have Exploit-WMF or Backdoor-CEP, please submit samples to http://www.webimmune.net.
Risk Assessment Definition
For further information on the Risk Assessment and AVERT Recommended Actions please see: http://www.mcafeesecurity.com/us ... risk_assessment.htm
Best Regards,
McAfee AVERT - Anti Virus and Vulnerability Research, Analysis, and
Solutions visit us at www.avertlabs.com
Technical details: this is a DLL which gets injected to all processes loading user32.dll.
It patches the Escape() function in gdi32.dll. The result of the patch is that the SETABORT escape sequence is not accepted anymore.
此漏洞已经通过LJ邮件和即时通讯软件流行,并且都是打这jpg的幌子。
已发现一个名为“Happy New Year”的LJ邮件包含图片"picture of 2006"并且包括一个含有利用wmf漏洞的附件,名为"HappyNewYear.jpg" (MD5: DBB27F839C8491E57EBCC9445BABB755). F-secure命名为PFV-Exploit.D。当HappyNewYear.jpg下载到硬盘时,当打开此文件或者预览次文件或者用google桌面搜索,此文件将执行,并从xxx.ritztours.com下载一个Bifrose后门,F-secure检测为 Backdoor.Win32.Bifrose.kt。请在防火墙中过滤此地址。