CERTA-2000-ALE-011
Vulnerability from certfr_alerte

Simpson est un cheval de Troie qui se propage par un fichier compressé (zip) auto-extractible nommé SIMPSONS.EXE

Description

Ce cheval de Troie proposé sous forme de fichier exécutable contient deux fichiers SIMPSONS.BAT et SIMPSONS.BMP.

Lorsque le fichier SIMPSONS.EXE est lancé il extrait les fichiers et exécute automatiquement SIMPSONS.BAT.

SIMPSONS.BAT utilise la commande DELTREE.EXE pour effacer les disques de A: à D:.

Ce cheval de Troie n'affecte pas Windows NT ni Windows 2000 car la commande Deltree n'existe plus sur ces versions.

Solution

Mettre à jour votre anti-virus

Windows 9x

Impacted products
Vendor Product Description
References
Sophos None vendor-advisory
Symantec None vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eWindows 9x\u003c/P\u003e",
  "closed_at": "2000-06-29",
  "content": "## Description\n\nCe cheval de Troie propos\u00e9 sous forme de fichier ex\u00e9cutable contient\ndeux fichiers SIMPSONS.BAT et SIMPSONS.BMP.\n\nLorsque le fichier SIMPSONS.EXE est lanc\u00e9 il extrait les fichiers et\nex\u00e9cute automatiquement SIMPSONS.BAT.\n\nSIMPSONS.BAT utilise la commande DELTREE.EXE pour effacer les disques de\nA: \u00e0 D:.\n\nCe cheval de Troie n\u0027affecte pas Windows NT ni Windows 2000 car la\ncommande Deltree n\u0027existe plus sur ces versions.\n\n## Solution\n\nMettre \u00e0 jour votre anti-virus\n",
  "cves": [],
  "initial_release_date": "2000-06-29T00:00:00",
  "last_revision_date": "2000-06-29T00:00:00",
  "links": [],
  "reference": "CERTA-2000-ALE-011",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2000-06-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Cheval de troie"
    }
  ],
  "summary": "Simpson est un cheval de Troie qui se propage par un fichier compress\u00e9\n(zip) auto-extractible nomm\u00e9 SIMPSONS.EXE\n",
  "title": "Trojan Simpsons",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Sophos",
      "url": "http://www.sophos.com/virusinfo/analyses/trojsimpsons.html"
    },
    {
      "published_at": null,
      "title": "Symantec",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…