
Rule:  

--
Sid:
797

--
Summary:
This rule has been placed in deleted.rules. It has been superceded by
sid 721.

--
Impact:
Mail worms may spread rapidly because users execute them.

--
Detailed Information:
Windows systems are often configured not to display file extensions.
By adding a second extension, users get confused and think that an
executable is a picture - e.g. niceboy.jpg.vbs gets displayed as
nicegboy.jpg but is a visual basic script and not a picture.

--
Affected Systems:
 
--
Attack Scenarios:
Famous worms (ILOVEYOU, KOURNIKOVA) are based on this method.

--
Ease of Attack:
Very easy. One needs to attach a file and hope that it gets executed.

--
False Positives:
None Known
Could be an error on sender's side.

--
False Negatives:
None Known
-

--
Corrective Action:
Use antivirus software. Configure mail clients securely, especially when
using windows desktops. Educate your mail users. Deny all attachments at
the gateway if you can.

--
Contributors:
Original rule writer unknown
Snort documentation contributed by tobias.haecker@to.com
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:
See websites of antivirus companies.

--
