Summary
This host is installed with Energizer DUO USB Battery Charger Software which contains a backdoor.
Impact
Successful exploitation let attackers to remotely control a system, including the ability to list directories. The backdoor operates with the privileges of the logged-on user.
Impact Level: System
Solution
Remove the Energizer UsbCharger software and
Please follow the instruction specified in,
http://www.kb.cert.org/vuls/id/154421
Insight
As part of the installation process of 'USB charger software package', a file 'Arucer.dll' is created and added to the registry run key and this file is the Trojan. Trojan listens for commands from anyone who connects and can perform various actions, such as:
- Download a file
- Execute a file
- Send a directory/files listing to the remote attacker
Affected
Energizer DUO USB Battery Charger Software
References
Severity
Classification
-
CVE CVE-2010-0103 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Aastra IP Telephone Hardcoded Telnet Password Security Bypass Vulnerability
- Adobe Air Multiple Vulnerabilities - November12 (Windows)
- Adobe Acrobat and Reader 'printSeps()' Function Heap Corruption Vulnerability
- Adobe AIR Multiple Vulnerabilities-01 Sep13 (Mac OS X)
- Adobe Air Multiple Vulnerabilities -01 May 13 (Mac OS X)