6.6 Medium
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.927 High
EPSS
Percentile
99.0%
The remote host seems to have been infected with the Bofra virus or one of its
variants, which infects machines via an Internet Explorer IFRAME exploit.
It is very likely this system has been compromised.
# SPDX-FileCopyrightText: 2005 Brian Smith-Sweeney
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.15746");
script_version("2023-06-27T05:05:30+0000");
script_tag(name:"last_modification", value:"2023-06-27 05:05:30 +0000 (Tue, 27 Jun 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2004-1050");
script_name("Bofra Virus Detection");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2005 Brian Smith-Sweeney");
script_family("Malware");
script_dependencies("find_service.nasl", "httpver.nasl", "global_settings.nasl");
script_require_ports(1639);
script_exclude_keys("Settings/disable_cgi_scanning");
script_xref(name:"URL", value:"http://securityresponse.symantec.com/avcenter/venc/data/[email protected]");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/11515");
script_tag(name:"solution", value:"Re-install the remote system.");
script_tag(name:"summary", value:"The remote host seems to have been infected with the Bofra virus or one of its
variants, which infects machines via an Internet Explorer IFRAME exploit.
It is very likely this system has been compromised.");
script_tag(name:"qod_type", value:"remote_analysis");
script_tag(name:"solution_type", value:"Mitigation");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
port = 1639; # This is where we saw Bofra; YMMV
if(!get_port_state(port))
exit(0);
url = "/reactor";
req = http_get(item:url, port:port);
res = http_keepalive_send_recv(port:port, data:req);
if(!res)
exit(0);
hex_res = hexstr(res);
if(egrep(pattern:"<IFRAME SRC=file://",string:res) || "3c0049004600520041004d00450020005300520043003d00660069006c0065003a002f002f00" >< hex_res) {
report = http_report_vuln_url(port:port, url:url);
security_message(port:port, data:report);
exit(0);
}
exit(99);