[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Full-Disclosure] New exploit now circulating?



We started seeing these trapped on our gateways late Monday night EST, we
are just blocking it and have not dissected it at all.

-----Original Message-----
From: full-disclosure-admin@xxxxxxxxxxxxxxxx
[mailto:full-disclosure-admin@xxxxxxxxxxxxxxxx] On Behalf Of
PNIXON@xxxxxxxxxxxxxxxxxxx
Sent: Wednesday, March 24, 2004 4:29 PM
To: full-disclosure@xxxxxxxxxxxxxxxx
Subject: RE: [Full-Disclosure] New exploit now circulating?


I'm also curious if it changes between sources or if it's something that can
be blocked at a firewall?

-----Original Message-----
From: Kristian Hermansen [mailto:khermansen@xxxxxxxxxxxxxxxxx]
Sent: Wednesday, March 24, 2004 3:06 PM
To: full-disclosure@xxxxxxxxxxxxxxxx; jherm@xxxxxxxxxxx
Subject: [Full-Disclosure] New exploit now circulating?



It looks like the new iFrame exploit is making the rounds, so has anyone
analyzed the payload yet (see below)?  Or is this just the new Netsky.P?  Is
it linking to a local file or within the email itself?  What's going on here
or did I miss something?

 

cid:031401Mfdab4$3f3dL780$73387018@57W81fa70Re

 

What is this link when deciphered?

 

Kristian Hermansen
khermansen@xxxxxxxxxxxxxxxxx


  _____  


From: hobknob@xxxxxxxxxxxx [mailto:hobknob@xxxxxxxxxxxx] 
Sent: Wednesday, March 24, 2004 2:35 PM
To: webmaster@xxxxxxxxxxxx
Subject: Mail Delivery (failure webmaster@xxxxxxxxxxxx)

 

If the message will not displayed automatically,
follow the link to read the delivered message.

Received message is available at:
www.zerotoys.com/inbox/webmaster/read.php?sessionid-797