CERTA-2000-ALE-011

Vulnerability from certfr_alerte - Published: - Updated:

Simpson est un cheval de Troie qui se propage par un fichier compressé (zip) auto-extractible nommé SIMPSONS.EXE

Description

Ce cheval de Troie proposé sous forme de fichier exécutable contient deux fichiers SIMPSONS.BAT et SIMPSONS.BMP.

Lorsque le fichier SIMPSONS.EXE est lancé il extrait les fichiers et exécute automatiquement SIMPSONS.BAT.

SIMPSONS.BAT utilise la commande DELTREE.EXE pour effacer les disques de A: à D:.

Ce cheval de Troie n'affecte pas Windows NT ni Windows 2000 car la commande Deltree n'existe plus sur ces versions.

Solution

Mettre à jour votre anti-virus

Windows 9x

Impacted products
Vendor Product Description
References
Sophos None vendor-advisory
Symantec None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eWindows 9x\u003c/P\u003e",
  "closed_at": "2000-06-29",
  "content": "## Description\n\nCe cheval de Troie propos\u00e9 sous forme de fichier ex\u00e9cutable contient\ndeux fichiers SIMPSONS.BAT et SIMPSONS.BMP.\n\nLorsque le fichier SIMPSONS.EXE est lanc\u00e9 il extrait les fichiers et\nex\u00e9cute automatiquement SIMPSONS.BAT.\n\nSIMPSONS.BAT utilise la commande DELTREE.EXE pour effacer les disques de\nA: \u00e0 D:.\n\nCe cheval de Troie n\u0027affecte pas Windows NT ni Windows 2000 car la\ncommande Deltree n\u0027existe plus sur ces versions.\n\n## Solution\n\nMettre \u00e0 jour votre anti-virus\n",
  "cves": [],
  "links": [],
  "reference": "CERTA-2000-ALE-011",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2000-06-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Cheval de troie"
    }
  ],
  "summary": "Simpson est un cheval de Troie qui se propage par un fichier compress\u00e9\n(zip) auto-extractible nomm\u00e9 SIMPSONS.EXE\n",
  "title": "Trojan Simpsons",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Sophos",
      "url": "http://www.sophos.com/virusinfo/analyses/trojsimpsons.html"
    },
    {
      "published_at": null,
      "title": "Symantec",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…