Subj : Bugbear.A virus notes
To   : David Noon
From : Mike Luther
Date : Fri Oct 04 2002 12:40 am

Yes Dave..

DN> According to that report, the virus requires M$ Lookout (or a user who
DN> is as brain-dead as Lookout) to be activated, as it is
DN> transported as a mail attachment. The mail message is
DN> the Trojan, I suppose. The size of the executable
DN> attachment is always 50,688 bytes. [A "virus" the size
DN> of an elephant!]

DN> Unless you are running Lookout, there should be no
DN> real threat to an OS/2 box. [Assuming the BBC is
DN> correct.]

I understand that the virus cannot be ACTIVATED.  What I also saw with this
same port 137 and 139 port ramp up with NIMDA.A here is different, in a way.
The inbound probes to look for a penetratable box on the port 137/139 sequence
*CAN* result in dropping file onto the OS/2 box from afar *IF* the NETBIOS over
OS/2 protocol is installed on the system and *IF* the initial probe is able to
establish how to write to a shared resource on it.

I absolutely agree that the virus cannot, as we understand it is recorded to
operate, execute on the OS/2 box at all.

The point is that NIMDA.A, a similar sort of approach, before the entire attack
profile of the creation was propagated, *WAS* able to download READ.ME and so
on actually into the OS/2 box into various directories.

The fact that it is transported as a mail attachment isn't all of the story as
in the above.  George Vandervort's Fido post for his protective vendor outlined
more of the story than is noted by either you or Peter.  It was the one which
made the comparison on the Port 137/139 Netbios access method and the previous
NIMDA.A use of the same techniques.

In that I've personally seen that approach compromise an OS/2 only box to the
extent that it loaded the required files remotely onto it not once but twice, I
posted the original message.

I've further seen this same approach here, when the penetration attempt also
adds JAVA to the messaging mechanism, actually start a message window in an
attempt on an OS/2 box to execute the Trojan.  But of course, the Trojan won't
run in OS/2.  The way the loaded message deal works is that the screen
placement for the pure white 'empty' box for that message is made very tiny in
size.  In this case, it was deliberately skewed down to the very lower right
corner of my OS/2 desktop.  Only the tiny upper left hand corner of the bogus
message opening JAVA attempt could be seen, the little close me box button you
usually see to close the window.  It simply got stuck there,in that it couldn't
execute the payload.  But it was able to TRY to do so,even in OS/2.

If you will think a little bit about the possibility of being able to even just
upload a file to any OS/2 box, it ought to give you pause to ponder. At that
point any executable which will execute in DOS can be a problem, or any in
OS/2, or any FAMILY mode program as well.   OS/2 is not at all free of
potential problems under this approach.


--> Sleep well; OS/2's still awake! ;)

Mike @ 1:117/3001

--- Maximus/2 3.01
* Origin: Ziplog Public Port (1:117/3001)