Date: 10 January 2003
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2003.0017 -- Trend Micro Medium Risk Virus Alert
WORM_LIRVA.C
10 January 2003
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Vendor: Trend Micro
Operating System: Windows
Impact: Access Privileged Data
Execute Arbitrary Code/Commands
Denial of Service
Access Required: Remote
Comment: For additional information, please see:
http://securityresponse.symantec.com/avcenter/venc/data/w32.lirva.c@mm.html
http://vil.mcafee.com/dispVirus.asp?virus_k=99949
http://www.sophos.com/virusinfo/analyses/w32avrilb.html
http://www.messagelabs.com
http://www3.ca.com/virusinfo/Virus.asp?ID=13981
http://zdnet.com.com/2100-1105-979475.html
- --------------------------BEGIN INCLUDED TEXT--------------------
Dear Trend Micro Customer:
This mass-mailing worm propagates via email, mapped network-shared drives,
IRC, ICQ and KaZaA Peer-to-Peer file sharing. It arrives through email
with the following details:
Subject: (any of the following)
Fw: Redirection error notification
Re: Brigada Ocho Free membership
Re: According to Purge's Statement
Fw: Avril Lavigne - CHART ATTACK!
Re: Reply on account for IIS-Security Breach (TFTP)
Re: ACTR/ACCELS Transcriptions
Re: IREX admits you to take in FSAU 2003
Fwd: Re: Have U requested Avril Lavigne bio?
Re: Reply on account for IFRAME-Security breach
Fwd: Re: Reply on account for Incorrect MIME-header
Re: Vote seniors masters - don't miss it!
Fwd: RFC-0245 Specification requested...
Fwd: RFC-0841 Specification requested...
Fw: F. M. Dostoyevsky
For more information on WORM_LIRVA.C, please visit our Web site at:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_LIRVA.C
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBPh7WcCh9+71yA2DNAQGpRAP/WDYAwlsnhbiebTLQGW9nalukbIwy4hjk
nZ8iofKI0CN9hO/vIb7VVzjZG3tMeZBZVVvniP0ORfymdB0/n1+w1K5eCG7CAZ7q
WdpKVsRJ2S7NNsmMruERB6d/au9XAuCdSBwd8ZcGebsuDWcmcPPAQr9eg/DtJBxp
AD18XhrdP5o=
=LUUG
-----END PGP SIGNATURE-----
|