Date: Sat, 30 Sep 2006 04:48:23 -0500 (CDT)
From: Gadi Evron <ge@linuxbox.org.>
To: [email protected]Subject: setSlice exploited in the wild - massively
Message-ID: <Pine.LNX.4.21.0609300445490.18540-100000@linuxbox.org.>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-1.7.5 (linuxbox.org [127.0.0.1]); Sat, 30 Sep 2006 04:48:24 -0500 (CDT)
X-Virus-Scanned: antivirus-gw at tyumen.ru
Exploit code is available publicly:
http://www.milw0rm.com/exploits/2440
SANS diary:
http://isc.sans.org/diary.php?storyid=1742
And this is so massively exploited, it makes VML look cute. There's a
rootkit, some other malware, and haxdor! (a phishing trojan horse)
Thanks to Roger Thompson at explabs.com for first reporting it.
Gadi.