OT::possible warning: virus through picture?

triska

Platinum Member
Jul 30, 2001
2,409
0
76
i was sent by a certain member of AT a picture...
when i opened it it was kidna weird, something was up with teh picture
anywayz, as i closed it, many error windows came up
about kernell32.dll and others which i missed...
i bakced up everything
so when i restart my computer next, if i do have problems with my op system, i will post name to bewary of this person
of course it mite be just my system reacting to the picture..i dont know
but to be on the safe side
wish me luck on the restart
thankgod for the extra hd space or id be riskin a lot!
before i do restart, any suggestion? runnin norton's now, almost done tho, gonna restart soon
 

triska

Platinum Member
Jul 30, 2001
2,409
0
76
havent restarted
when i do i will let u know
making sure there was nothng changed like moving kernel from teh system folder or nethin like that first
then restarting...
hoping...hoping..hoping...
checking and double checking files i will not miss
hehe
ill post prolly in mornin tomorrow
well i mean later on in the day today!
hehe
it is mornin
 

Byte

Platinum Member
Mar 8, 2000
2,877
6
81
Do you have anitvirus software? Try check it out. If not do a free scan at symantec or mcafee. Plus there are a lot of antivirus software out there that is free.
 

vegetation

Diamond Member
Feb 21, 2001
4,270
2
0
What was the file extension? If it was jpg, gif, bmp, any typical graphic extension then there is zero chance of a virus.

Some corrupted jpgs can cause faults with a poor graphic viewer, however. This is not indicative of a virus, just the pic file is corrupted somehow.
 

Fjive

Senior member
May 15, 2001
456
0
76
uh oh...looks like he didnt make it for a restart...
cause he still havent post anything until now...geee...poor guy
 

Modeps

Lifer
Oct 24, 2000
17,254
44
91
its possible and microsoft has addressed the issue.

CERT Advisory CA-2001-36 Microsoft Internet Explorer Does Not Respect
Content-Disposition and Content-Type MIME Headers

Original release date: December 19, 2001
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.


Systems Affected

* Microsoft Internet Explorer 6.0 for Windows
* Microsoft Outlook, Outlook Express, or any other software that
utilizes vulnerable versions of Internet Explorer to render HTML

Overview

Microsoft Internet Explorer contains a vulnerability in its handling of
certain MIME headers in web pages and HTML email messages. This
vulnerability may allow an attacker to execute arbitrary code on the
victim's system when the victim visits a web page or views an HTML
email message.

I. Description

Web pages and HTML email messages usually contain HTML text, but other
files may also be included. The MIME headers Content-Disposition and
Content-Type provide the information needed by the HTML rendering
software to determine the type of these files. In Microsoft Internet
Explorer, these MIME headers are consulted when evaluating whether to
process an embedded file, but they are ignored when the file is
actually processed.

For example, if an executable (.exe) file is embedded with MIME headers
that misrepresent it as a JPEG image file (.jpg), Internet Explorer
will treat the file as a JPEG when evaluating whether it is safe to
open. Once this evaluation is complete, the file will be opened
according to its .exe file extension and will be executed on the local
system.

This behavior results in a vulnerability that allows attackers to
bypass the security measures that typically screen out executable code.
This code would be executed with the privileges the user who views the
web page or email message.

Users who view a malicious web site or HTML email message may be able
to prevent the execution of the attacker's code by using the download
progress dialog box to cancel the download. However, depending on the
size of the embedded file and the speed of the network connection,
users may not have time to cancel the file download.

The CERT/CC is tracking this vulnerability as VU#443699, which
corresponds directly to the "File Execution" vulnerability described in
Microsoft Security Bulletin MS01-058. This Microsoft bulletin is
available at

http://www.microsoft.com/technet/security/bulletin/MS01-058.asp

This vulnerability is being referenced in CVE as CAN-2001-0727.

II. Impact

By convincing a user to view a malicious web page or HTML email
message, a remote attacker can cause the user to execute arbitrary
code. Any such code would run with the privileges of the user who
attempted to view the content.

III. Solution

Apply a patch from your vendor

Microsoft has released a cumulative patch for Internet Explorer
that
corrects this vulnerability and several others. For more
information
about the patch and the vulnerabilities, please see Microsoft
Security Bulletin MS01-058:


http://www.microsoft.com/technet/security/bulletin/MS01-058.asp

Disable file downloads in all security zones

As a workaround, you can prevent malicious files from being
downloaded by disabling file downloads in all security zones. Note
that this decision will impact browser functionality.

Appendix A. - Vendor Information

This appendix contains information provided by vendors for this
advisory. As vendors report new information to the CERT/CC, we will
update this section and note the changes in our revision history. If a
particular vendor is not listed below, we have not received their
comments.

Microsoft Corporation

The following documents regarding this vulnerability are available
from Microsoft:

http://www.microsoft.com/technet/security/bulletin/MS01-058.asp
http://support.microsoft.com/default.aspx?scid=kb;EN-US;q313675
_________________________________________________________________

The CERT Coordination Center acknowledges Jouko Pynnonen as the
discoverer of this vulnerability and thanks Microsoft for the
information presented in MS01-058.
_________________________________________________________________

Author: This document was written by Jeffrey P. Lanza.
______________________________________________________________________

This document is available from:
http://www.cert.org/advisories/CA-2001-36.html
______________________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from

http://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available from our
web site

http://www.cert.org/

To subscribe to the CERT mailing list for advisories and bulletins,
send email to majordomo@cert.org. Please include in the body of your
message

subscribe cert-advisory

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
______________________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie Mellon
University makes no warranties of any kind, either expressed or implied
as to any matter including, but not limited to, warranty of fitness for
a particular purpose or merchantability, exclusivity or results
obtained from use of the material. Carnegie Mellon University does not
make any warranty of any kind with respect to freedom from patent,
trademark, or copyright infringement.
_________________________________________________________________

Conditions for use, disclaimers, and sponsorship information

Copyright 2001 Carnegie Mellon University.

Revision History

December 19, 2001: Initial release
 

clarkmo

Platinum Member
Oct 27, 2000
2,615
2
81
They are not actually pictures though. They are .exe files. Outlook/IE just are tricked into treating them as pictures. You don't have the opportunity to view them as they are automatically executed when opening the email. Get the patch!
 

jlee

Lifer
Sep 12, 2001
48,518
223
106
Also make sure it doesn't have a double file extention (eg "mypicture.jpg.pif") - Windows will hide the last extention by default, so you'll see "mypicture.jpg"...
 



<< What was the file extension? If it was jpg, gif, bmp, any typical graphic extension then there is zero chance of a virus. >>


*cough*clueless*cough*
;)