But coupled with other exploits, JavaScript could be used to wreak havoc on a PC, experts warn. "JavaScript is a pretty powerful language," said Clark.

by ZDnet

A worm that uses Microsoft's MSN Messenger application to exploit a browser glitch emerged late on Wednesday and spread rapidly, despite the existence of a patch covering the security hole, according to experts. The worm replicates itself by sending messages to other MSN Messenger users but doesn't otherwise damage PCs, experts said.

The virus may have originated with a demonstration originally created weeks ago to warn of an Internet Explorer exploit. JS/Exploit-Messenger or JS.Menger.Worm, as it is called, apparently emerged from several different locations at once on Wednesday. It exploits a hole in the Internet Explorer browser that Microsoft made public on February 11 along with a bug fix, just two days before the worms appeared.

"The main problem is getting people to apply the patches," said Jack Clark, product marketing manager with Network Associates. "There are a lot of desktops out there."

A worm is a type of virus that replicates itself across a network.

The hole allows Internet Explorer to automatically execute harmful JavaScript code embedded in a Web page. In this case, code appeared on several Web sites causing Explorer to create a Messenger missive and dispatch it to other contacts within Messenger. The note contains a link back to the Web page containing the code, with a message like "Hey go to (link) plz" or "Go to (link) NoW !!!".

Some of the pages containing the code were taken down quickly, according to virus companies. The worm appears to have spread at high speed, due to the instantaneous nature of Internet-based instant messaging, but does not appear to have infected large numbers of users. Sophos, a UK-based antivirus company, said none of its customers had reported being hit by the virus.

However, experts say that instant messaging--which is now closely integrated with Internet Explorer--and worms could turn out to be an explosive combination because of the speed with which instant messages can spread, much more quickly than an e-mail message.

JavaScript code is not as damaging as, say, the Visual Basic script distributed by many notorious e-mail worms. It is "sandboxed", meaning that the types of actions the scripts can carry out are strictly limited; for example, scripts can't carry out certain system-level actions unless they come from a vendor that is trusted and approved by the user.

But coupled with other exploits, JavaScript could be used to wreak havoc on a PC, experts warn. "JavaScript is a pretty powerful language," said Clark.

The JavaScript code used to create the worm may have come from a demonstration designed to warn of the dangers of the Internet Explorer bug as early as December, according to Sophos.

Researchers originally warned Microsoft of the IE hole in mid-December, according to Sophos support manager Peter Cooper. The researchers said their warning about the "same origin policy violation" had gone unacknowledged from Microsoft, so they created a demonstration of the exploit to encourage the company to take action, according to Cooper.

"It's possible the virus writer crafted the message him- or herself, but that the payload came from this demonstration," Cooper said.

Microsoft was not immediately available for comment.

Most antivirus companies have updated their virus definitions to recognize JS/Exploit-Messenger. The software can generally be updated online.

Back To The Study