Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:801 |
| Message | Virus - Possible Worm - doc.vbs file |
| Summary | This rule has been placed in deleted.rules. It has been superceded by sid 721. |
| Impact | Mail worms may spread rapidly because users execute them. |
| Detailed Information | Windows systems are often configured not to display file extensions. By adding a second extension, users get confused and think that an executable is a WORD document - e.g. resume.doc.vbs gets displayed as resume.doc but is a visual basic script and not a WORD document. |
| Affected Systems | |
| Attack Scenarios | Famous worms (ILOVEYOU, KOURNIKOVA) are based on this method. Warning: A WORD document is in now way more secure than a visual basic script. Wrongly configured antivirus software my ignore this files and let a macro virus pass. |
| Ease of Attack | Very easy. One needs to attach a file and hope that it gets executed. |
| Corrective Action | Use antivirus software. Configure mail clients securely, especially when using windows desktops. Educate your mail users. Deny all attachments at the gateway if you can. |
| Additional References |
--
DID:144987
--
http://www.aanval.com/