IvanOffelitch said:
This is the 2nd time today this has happened...first I get the following prompt from Norton:
Time: 1:10 p.m.
Date: 8/14/2005
Intrusion: ICC Profile TagData Overflow
Intruder: www.elitefitness.com (69.90.197.215)
Risk Level: High
Protocol: TCP
Attacked IP: local host
Attacked Port: 1374
IMMEDIATELY after this happens, I get a NAV warning that my system was infected with
Bloodhound.Exploit.38
Someone??
Anyone???
Powdered Toast Man???
Digger???
Help???
Whiskey
Tango
Foxtrot
Here's what I read about this. If it happens again, please post the address of the page you were looking at when it happend.
Microsoft Windows color management module ICC profile buffer overflow vulnerability
Description:
Microsoft Windows is prone to a buffer overflow vulnerability in the Color Management Module. The issue is due to a boundary condition error related to the parsing of ICC (International Color Consortium) Profile tags in various supported image and document formats.
ICC Profile data may possibly be embedded in various file formats, including JPEG, GIF, EXIF, TIFF, PNG, PICT, PDF, PostScript, SVG, JDF, and CSS3. Some of these formats may not provide an attack vector, especially if Microsoft does not provide native support or does not call the vulnerable functionality when handling certain formats.
Successful exploitation may result in execution of arbitrary code in the context of the currently logged in user. This vulnerability could be exploited through a Web site that hosts a malicious document, by previewing or opening malicious content in email, or through other means that will allow an attacker to send the victim a malicious document.
There is also a risk that other Microsoft or third-party applications that rely on the affected functionality may be vulnerable. A number of third-party applications may ship with vulnerable libraries, so may remain vulnerable despite having applied the Microsoft patch.
Remediation:
Microsoft has released patches to address this vulnerability in supported platforms.
Referring URL:
http://www.securityfocus.com/bid/14214/info