Here's the Readme.txt for the exploit:
http://www.infobyte.com.ar/down/isr-evilgrade-Readme.txt
..:: DESCRIPTION
ISR-evilgrade: is a modular framework that allow us to take advantage
of poor upgrade implementations
by injecting fake updates.
* How does it work?
It works with modules, each module implements the structure needed to
emulate a false update of specific applications/systems. Evilgrade
needs the manipulation of the victim dns traffic.
So far, these are the "implemeted modules" that are vulnerable:
Implemented modules:
-------------------
- Java plugin
- Winzip
- Winamp
- MacOS
- OpenOffices
- iTunes
- Linkedin Toolbar
- DAP [Download Accelerator]
- notepad++
- speedbit
So, a Windows User with iTunes installed *may* still be vulnerable IF
they have not installed last month's DNS update, KB951978:
MS08-037: Description of the security update for DNS in Windows Server
2003, in Windows XP, and in Windows 2000 Server (client side): July 8, 2008
http://support.microsoft.com/kb/951748
Apple had to rerelase it's update for the DNS vulnerability because the
first one did *not* mitigate the vulnerability.
MowGreen [MVP 2003-2008]
===============
*-343-* FDNY
Never Forgotten
===============
Tom said:
Hi Bill,
Yes it came with Apple Update.
I think the server or the files on the server where infected for a
short period, the same on the Adobe update server.
The Virus was already known by Apple and there was a intern Memo that
describe the wiping of the virus of the HDD but the battery story that
was my idea!
That the virus could do so match on the server (MS 2003 SP2)Symantec
Av version 10 Running on it.
Was a horror some day's!
Regards >*< TOM >*<
Bill Sanderson schreef: