Forum Moderators: rogerd
Scan type: Auto-Protect Scan
Event: Threat Found!
Threat: Dialer.7AdPower
File: C:\Documents and Settings\jlo\Local Settings\Temporary Internet Files\Content.IE5\4HE7GDMN\int_ver34[1].CAB
Location: C:\Documents and Settings\jlo\Local Settings\Temporary Internet Files\Content.IE5\4HE7GDMN
Computer: COMP0***
User: COMP0***\JLO
Action taken: Pending Side Effects Analysis
Date found: Tuesday, May 23, 2006 8:43:02 AM
I think it is more likely that this ActiveX control was installed by a web page visited by the user. Nevertheless, be sure your forum software, PHP, Apache, etc., are up to date - some exploits have used features like image uploads to take advantage of buffer overloads or other flaws. An unlinked image itself, though, shouldn't be able to infect a user.
I assume that you have tried doing what the user says he did and your AV software didn't sound any warnings.
The vulnerability is caused due to an input validation error in the image upload handling. This can exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site by uploading a specially crafted valid image containing embedded HTML and script code.
[secunia.com...]