E-mail this

  • Home

  • Search
  • Send Comments
  • What's New
  • Hottest 25
      Legends

  • Odd News
  • Glossary
  • FAQ

  • Autos
  • Business
  • Cokelore
  • College
  • Computers

  • Crime
  • Critter Country
  • Disney
  • Embarrassments
  • Food

  • Glurge Gallery
  • History
  • Holidays
  • Horrors
  • Humor

  • Inboxer Rebellion
  • Language
  • Legal
  • Lost Legends
  • Love

  • Luck
  • Media Matters
  • Medical
  • Military
  • Movies

  • Music
  • Old Wives' Tales
  • Photo Gallery
  • Politics
  • Pregnancy

  • Quotes
  • Racial Rumors
  • Radio & TV
  • Religion
  • Risqué Business

  • Science
  • September 11
  • Sports
  • Titanic
  • Toxin du jour

  • Travel
  • Weddings

  • Message Archive
 
Home --> Computers --> Virus Hoaxes & Realities --> Gibe

Gibe

Virus name:   Gibe   (also known as W32/Gibe@mm, WORM_GIBE.A, and W32/Gibe-A).

Status:   Real.

Example:   [Collected on the Internet, 2002]

From: Microsoft Corporation Security Center
To: Microsoft Customer <'customer@yourdomain.com'>
Subject: Internet Security Update

Microsoft Customer,

this is the latest version of security update, the "4 Mar 2002 Cumulative Patch" update which eliminates allknown security vulnerabilities affecting Internet Explorer andMS Outlook/Express as well as six new vulnerabilities, and isdiscussed in Microsoft Security Bulletin MS02-005. Install now toprotect your computer from these vulnerabilities, the most serious of whichcould allow an attacker to run code on your computer.

Description of several well-know vulnerabilities:

- "Incorrect MIME Header Can Cause IE to Execute E-mail Attachment" vulnerability.
If a malicious user sends an affected HTML e-mail or hosts an affectede-mail on a Web site, and a user opens the e-mail or visits the Web site,Internet Explorer automatically runs the executable on the user's computer.
- A vulnerability that could allow an unauthorized user to learn the location of cached content on your computer. This could enable the unauthorized user to launch compiled HTML Help (.chm) files that contain shortcuts to executables, thereby enabling the unauthorized user to run the executables on your computer.
- A new variant of the "Frame Domain Verification" vulnerability could enable amalicious Web site operator to open two browser windows, one in the Web site'sdomain and the other on your local file system, and to pass information fromyour computer to the Web site.

- CLSID extension vulnerability. Attachments which end with a CLSID file extensiondo not show the actual full extension of the file when saved and viewed withWindows Explorer. This allows dangerous file types to look as though they are simple,harmless files - such as JPG or WAV files - that do not need to be blocked.

System requirements:
Versions of Windows no earlier than Windows 95.
This update applies to:
Versions of Internet Explorer no earlier than 4.01
Versions of MS Outlook no earlier than 8.00
Versions of MS Outlook Express no earlier than 4.01

How to install
Run attached file q216309.exe

How to use
You don't need to do anything after installing this item.

For more information about these issues, read Microsoft Security Bulletin MS02-005, or visit link below.
http://www.microsoft.com/windows/ie/downloads/critical/default.asp
If you have some questions about this article contact us at rdquest12@microsoft.com

Thank you for using Microsoft products.

With friendly greetings,
MS Internet Security Center.
----------------------------------------
----------------------------------------
Microsoft is registered trademark of Microsoft Corporation.
Windows and Outlook are trademarks of Microsoft Corporation.

Origins:   Given W32/Gibe@MM how used we are to seeing real security warnings about Microsoft Internet Explorer and Microsoft Outlook, it was only a matter of time before someone disguised a virus as one.

The message quoted above is not a real Microsoft security warning. The q216309.exe file attached to it is a worm which will, when executed, send mail to addresses found in Microsoft Outlook's address book (and addresses found in any locally stored .htm, .html, .asp, and .php files) as well as installing a trojan horse which allows remote access to the infected system. (McAfee reports that "the worm was buggy, and did not successfully use Outlook to spread," however.)

See the links below for more information on how to detect and remove Gibe.

Additional Information:
    W32.Gibe@mm W32.Gibe@mm
(Symantec Security Response)
    W32/Gibe@MM W32/Gibe@MM
(McAfee Virus Information Library)
    Bogus Microsoft Security Update E-Mail Is Actually a Virus Bogus Microsoft Security Update E-Mail Is Actually a Virus
(Associated Press)
Last updated:   27 January 2008

Urban Legends Reference Pages © 1995-2014 by snopes.com.
This material may not be reproduced without permission.
snopes and the snopes.com logo are registered service marks of snopes.com.