Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Threats » JS/Coolsite.A@mm

Overview

Threat Risk LOW LOW
Destructivity LOW LOW
Payload Setting home page
Detection files published
Description created 17 Dec 2001 03:00:00
Description updated 19 Dec 2001 10:18:00
Malware type WORM
Alias EML/Coolsite.A
Spreading mechanism EMAIL
UNKNOWN
Summary None

JS/Coolsite.A@mm

Spreading

The planting of the malicious javascript is done through a known security hole in Internet Explorer - the Microsoft VM ActiveX Component Vulnerability.

This security hole can be closed by applying the patch available from:


http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS00-075.asp



Payload Details

The worm sets default home page to point to a pornographic site.



Analysis

n/a

Removal

n/a


Last Updated: 12 Nov 2015 11:06:10