A
Ant
"Ant":
I agree. I ran a test using IE on lowest possible security. I had KAV
3.5 realtime monitor active. No alert and no malware infestation.
The script does get downloaded to IE temp, and some av may alert on
this. For example, F-Prot for DOS finds VBS/Petch.A@dl (exact)
If KAV alerted (which it doesn't) it would name it Psyme rather than
Petch, as would McAfee. I checked this using Project VGREP.
I also Saved the page as a html file and scanned on demand. Both
F-Prot and F-Secure alert as VBS/Petch.A@dl
Sophos ignores the page with scan on demand, as it should. However,
if I create an html file from the ADODB Active-X/wmplayer code sample,
which would be dangerous if all the components were present, it
correctly detects the exploit (Troj/Psyme-Fam).
I suspect that some other scanners besides NOD32 will false alarm when
accessing the harmless web site.
It's easy to see that it's benign if you know html, and do a
"view-source:" on the URL. All the code samples are between <pre>
tags (preformatted text).
There are many sites which post similar code. Some of them are aware
that AV software will falsely alert, so they often replace "<" and ">"
characters in the examples with "[" and "]".