Worm Wriggles Through Yahoo! Mail Flaw 186
Jasen Bell writes to mention a ZDNet article about a clever new worm affecting users of Yahoo!'s email service. The virus uses a flaw in JavaScript to infect a computer when an email is opened from the user's web-based mail. From the article: "The worm, which was spotted in the wild early this morning, has hit the remote server more than 100,000 times, forwarding Yahoo e-mail addresses harvested from unsuspecting users, Turner said. Although the worm is spreading quickly, and no patch has been issued, Symantec is rating the threat a '2.' The security vendor uses a 1-to-5 rating system, with '5' as its most severe category."
Fell for this yestereday (Score:2, Informative)
Damn
Re:Not everyone affected... (Score:3, Informative)
Yeah, but this spreads via your Yahoo! contact list
Re:"This worm is a 2." (Score:3, Informative)
Category 5 - Very Severe
Highly dangerous threat type, very difficult to contain. All machines should download the latest virus definitions immediately and execute a scan. Email servers may need to come down. All three threat metrics must be High.
* Wild: High
* Damage: High
* Distribution: High
Category 4 - Severe
Dangerous threat type, difficult to contain. The latest virus definitions should be downloaded immediately and deployed.
* Wild: High
* Damage or Distribution: High
Category 3 - Moderate
Threat type characterized either as highly wild (but reasonably harmless and containable) or potentially dangerous (and uncontainable) if released into the wild.
* Wild: High
or
* Damage: High and Distribution: High
Category 2 - Low
Threat type characterized either as low or moderate wild threat (but reasonably harmless and containable) or non-wild threat characterized by an unusual damage or spread routine, or perhaps by some feature of the virus that makes headlines in the news.
* Damage: High
or
* Distribution: High
or
* Wild: Low or Moderate
Category 1 - Very Low
Poses little threat to users. Rarely even makes headlines. No reports in the wild.
* Wild: Low
* Damage or Distribution: Low
Here ya go (Score:3, Informative)
ThreatCon Level 1
Low : Basic network posture This condition applies when there is no discernible network incident activity and no malicious code activity with a moderate or severe risk rating. Under these conditions, only a routine security posture, designed to defeat normal network threats, is warranted. Automated systems and alerting mechanisms should be used.
Threatcon Level 2
Medium : Increased alertness
This condition applies when knowledge or the expectation of attack activity is present, without specific events occurring or when malicious code reaches a moderate risk rating. Under this condition, a careful examination of vulnerable and exposed systems is appropriate, security applications should be updated with new signatures and/or rules as soon as they become available and careful monitoring of logs is recommended. Changes to the security infrastructure are not required.
Threatcon Level 3
High : Known threat
This condition applies when an isolated threat to the computing infrastructure is currently underway or when malicious code reaches a severe risk rating. Under this condition, increased monitoring is necessary, security applications should be updated with new signatures and/or rules as soon as they become available and redeployment and reconfiguration of security systems is recommended. People should be able to maintain this posture for a few weeks at a time, as threats come and go.
Threatcon Level 4
Extreme : Full alert
This condition applies when extreme global network incident activity is in progress. Implementation of measures in this Threat Condition for more than a short period probably will create hardship and affect the normal operations of network infrastructure.
Behavior (Score:3, Informative)
Once executed, the worm forwards itself to an infected users' contacts on Yahoo! Mail. It also harvests these address and sends them to a remote internet server. Only contacts with an email address of either @yahoo.com or @yahoogroups.com are hit by this behaviour.
Here is the Source, Luke. (Score:4, Informative)
The subject field is important (Score:3, Informative)
Reference: Symantec advisory at http://securityresponse.symantec.com/avcenter/ven
The warm may not be as "innocent" (Score:5, Informative)
Here are the technical details of the worm:
1) Arrives on the compromised computer as an HTML email containing Javascript. The email may have the following characteristics:
From: Varies
Subject: New Graphic Site
Message body: Note: forwarded message attached.
2) Once the email is opened the worm exploits a vulnerability in the Yahoo email service to run a script.
3) Sends a copy of itself to certain email addresses gathered from the Yahoo email folders.
4) Targets email addresses from the @yahoo.com and @yahoogroups.com domains.
5) Contacts the following URL:
[http://]www.av3.net/index.htm
6) Sends a list of email addresses gathered to the above URL.
Re:Medireview virus attacks yahoo. (Score:5, Informative)
With a little creativity, this could be extended to grab a file off the HD, and send the data to any site it chose, but it does not sound like that is the case here.
Re:First reported (Score:4, Informative)
The article is wrong when it claims that it's "a flaw in JavaScript", it's a flaw in Yahoo's webmail. So the answer to your question is almost certainly: nobody thought it was a good idea to enable JavaScript in emails, the developers working on Yahoo's webmail didn't escape things properly and nobody was doing decent QA to catch the mistake the developers made. So basically, it's a management error.
There doesn't seem to be detailed technical information available anywhere, but it sounds very much like it's just a specialised form of an XSS attack, where you sneak code into the application in such a way that the application doesn't encode it properly for output to another user.
Re:Not everyone affected... (Score:1, Informative)
Re:The warm may not be as "innocent" (Score:2, Informative)
Comment removed (Score:3, Informative)
You should try Yahoo! POPS (Score:2, Informative)
Here's the flaw that's exploited (Score:4, Informative)
<img src='http://us.i1.yimg.com/us.yimg.com/i/us/nt/ma
target=""onload="whole bunch of crappy javascript here that uses only
single quotes and just goes on and on">
Note the lack of a space between the 'target' bit and the 'onload' bit. Now, apparently "target" is one of the HTML attributes that yahoo allows through on an IMG tag (why?). Anyway, it appears that yahoo's servers see both the target and the onload bit as one big long target attribute and let it through, whereas most browsers see that as a separate "target" and "onload" attribute and execute the javascript as soon as the image (one of the standard yahoo mail images, so it'll likely already be in the browser cache) is loaded.
The lesson here? I'm not really sure, beyond "double- and triple-check your parsing routines, since they will be used in security-sensitive code".