Class
DoS
Platform
Perl

Parent class: Malware

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

Read more

Class: DoS

DoS programs are designed to conduct DoS (Denial of Service) attacks on a victim computer. Essentially, these attacks send numerous requests to a remote computer, and if the computer does not have enough resources to process all the incoming requests, the result will be a denial of service.

Read more

Platform: Perl

No platform description

Description

Technical Details

This malicious program is designed to conduct Denial of Service attacks on a remote server. The program itself is a malicious script written in Perl. It is 7747 bytes in size.

Payload

The program exploits a buffer overflow vulnerability in processing incoming data in order to conduct a DoS attack on the remote machine.

Its functionality makes it possible to attack the following servers:

  • Avirt Mail Server v3.5
  • BFTelnet Server v1.1
  • BisonWare FTP Server v3.5
  • Broker FTP Server v3.5
  • Cmail SMTP Server v2.4
  • ExpressFS FTP server v2.x
  • G6 FTP Server v2.0 beta4/5
  • MDaemon httpd Server v2.8.5.0
  • PakMail SMTP/POP3 v1.25
  • Vermillion FTP Server v1.23
  • WFTPD FTP Server 2.40
  • XtraMail POP3 Server v1.11
  • ZetaMail POP3 Server v2.1

The remote malicious user is required to provide the address, type of server to be attacked and authorization parameters on program launch.

The malicious script may cause the server under attack to suffer reduced performance in supporting network connections.

Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Delete the original malicious program file (the location will depend on how the program originally penetrated the victim machine).
  2. Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.