Friday, October 28, 2005

Troj.Zapchas.K

Zapchas K, Troj.Zapchas.K, is a backdoor Trojan Horse, which allows a remote attacker to gain control over the infected computer via IRC. Zapchas' main purpose is to steal CD keys, but it can also upload and download files and run programs.

Thursday, October 27, 2005

Troj.BankAsh.J

BankAsh J, Troj.BankAsh.J, is a Trojan Horse that targets Microsoft Windows computers to steal information from and download programs onto. BankAsh registers itself as both a legitimate COM object, and as a Browser Helper Object (BHO) for Internet Explorer.

Wednesday, October 26, 2005

Troj.Sisery.A

Sisery A, Troj.Sisery.A, is a Trojan Horse that modifies the operating system's defaults to annoy. Changing the default values in the system registry causes most of these modifications.

Thursday, October 20, 2005

Mozilla Firefox IDN Host Buffer Overflow

An attacker could remotely execute code on a vulnerable system because of an exploitable Firefox buffer overflow vulnerability. This vulnerability can be exploited by giving Firefox a very long url made up of dashes. Firefox is vulnerable due to the way it handles the International Domain Name (IDN) feature for web pages not using the standard Latin alphabet characters.

Wednesday, October 19, 2005

Symantec Brightmail AntiSpam Denial of Service Vulnerabilities

A remote attacker can launch a Denial of Service attack (DoS) due to an error by the anti-virus scanner when processing deeply nested zip files. This attack is possible because the anti-virus scanner can take a really long period of time to fully scan or clean deeply nested zip files.