検索:
ホーム   »     »   Update: IE “createTextRange()” Remote Code Execution

Update: IE “createTextRange()” Remote Code Execution

  • 投稿日:2006年3月31日
  • 脅威カテゴリ:未分類
  • 執筆:ウイルス解析担当者
0

This is an update for an earlier blog entry. The web page
containing the exploit code will be detected as JS_DLOADER.BXR
while the downloaded component will be detected as WORM_SPYBOT.DC.
You may read on JS_DLOADER.BXR description by following the link
provided below:

  • www.trendmicro.com/vinfo/

As for customers who use Internet Explorer, disabling the Active
Scripting is suggested as a work around by Microsoft. More details
can be found in the following link:

  • http://www.microsoft.com/technet/security/advisory/917077.mspx

Another suggestion is to use another internet browser, Mozilla
Firefox or Netscape can do. It’s your choice what browser you want
to use.


Update(Obet, 26 March 2006 13:41:53)

For better detection on this 0-day IE exploit Trend Micro is
currently developing a generic pattern but a Beta version has been
released as EXPL_TXTRANGE.A and EXPL_TXTRANGE.B using CPR version
3.286.06. Trend Micro is still in the process of improving the
pattern for the final release as EXPL_TXTRANGE.GEN for this
exploit. More updates to come. To download the CPR you can click
here


No related posts.



  • 個人のお客さま向けオンラインショップ
  • |
  • 法人のお客さま向け直営ストア
  • |
  • 販売パートナー検索
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • 電子公告
  • ご利用条件
  • プライバシーポリシー
  • Copyright © 2021 Trend Micro Incorporated. All rights reserved.