Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.11135
Kategorie:Malware
Titel:Bugbear worm
Zusammenfassung:BugBear backdoor is listening on this port.
Beschreibung:Summary:
BugBear backdoor is listening on this port.

Vulnerability Insight:
The BugBear worm includes a key logger and can stop
antivirus or personal firewall software. It propagates itself through email and open
Windows shares.

Depending on the antivirus vendor, it is known as: Tanatos,
I-Worm.Tanatos, NATOSTA.A, W32/Bugbear-A, Tanatos, W32/Bugbear@MM,
WORM_BUGBEAR.A, Win32.BugBear.

Vulnerability Impact:
An attacker may connect to it to retrieve secret
information, e.g. passwords or credit card numbers.

Solution:
- Use an Anti-Virus package to remove it.

- Close your Windows shares

- Update your IE browser

See 'Incorrect MIME Header Can Cause IE to Execute E-mail Attachment'

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: BugTraq ID: 2524
Common Vulnerability Exposure (CVE) ID: CVE-2001-0154
http://www.securityfocus.com/bid/2524
Bugtraq: 20010330 Incorrect MIME Header Can Cause IE to Execute E-mail Attachment (Google Search)
http://marc.info/?l=bugtraq&m=98596775905044&w=2
http://www.cert.org/advisories/CA-2001-06.html
Computer Incident Advisory Center Bulletin: L-066
http://www.ciac.org/ciac/bulletins/l-066.shtml
Microsoft Security Bulletin: MS01-020
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-020
http://www.osvdb.org/7806
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A141
http://securitytracker.com/id?1001197
XForce ISS Database: ie-mime-execute-code(6306)
https://exchange.xforce.ibmcloud.com/vulnerabilities/6306
CopyrightCopyright (C) 2005 Michel Arboi & Thomas Reinke

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.