I went to gamespy.com, but when the main page was loading I got virus alert:
Sign of “Nutcracker family” has been found in “C:\Documents and Settings(User Name)\Local Settings\Temporary Internet Files\Content.IE5\PDOH6H8P\bg-tab-lft-0[1].gif” file.
I chose to delete it option. I cannot find it anymore. Should I still be worried? Was it a false positive? What could be some future advice? Should I still do a boot scan?
Thank you for the reassurance. I am curious about virus programming: If you delete the original file infected, can it still spread. Like can it become pandemic, not just epidemic? The main point is if a virus is found in Temporary, can you just delete it from there and you will be fine?
Ok so yeah if you have clear your temporary files i can say you dont have to worry and if Avast! detected it too But remember to do regulary some scan even if you think you didnt got virus just to be sure
Yes it is possible for malcreants to hide a PHP-exploit or a malicious Iframe attack inside a gif, read this how that can be performed: http://www.derkeiler.com/Mailing-Lists/securityfocus/pen-test/2008-02/msg00093.html
This malicious GIF file is usually infected by other malware, append with a hidden iframe. When a user visits a web page contains such GIF file, those hidden iframes may perform malicious routines in the affected system.
H.D. Moore explains here on how this could be performed:
The usual trick is to upload an ASP, ASPX, PHP, JSP, or other dynamic web
page to the server. If the applications allows you to set the extension
and the upload directory supports that scripting language, your job is
done.
If the server changes the extension to .JPG/.GIF (or only allows those
extensions), then you need to be more creative. On Apache, you can name a
file something.php.jpg, and Apache will still treat it as PHP.
Another option you can try is by sending an upload request (with a tool or
a HTTP request editor) that embeds a NULL byte before the .JPG extension.
ASP scripts tend to be vulnerable to this – the script will see the
entire file name, but the underlying file operation will truncate the
name of the file after the NULL byte. So something.asp%00.jpg would
become something.asp.
Finally, one trick that might help, is to upload a HTML document, with a
JPG extension, and see whether the browser treats it as HTML or an image
when you browse to it. Some browsers handle this different, sometimes
ignoring the mime type in favor of the file magic (not sure if this works
with images in IE 7).
What this allows you to do is upload arbitrary HTML content to the server,
which can contain javascript, which in turn can read the domain-specific
credentials of users visiting that page. This still requires the ability
to send users to your not-really-a-jpeg HTML page (for example, by
emailing them a link).
So you see for protection you are best served by a browser with an extension that can block script altogether, like Firefox with NoScript, for the server part we are dependant on the security performed by the site admins and webmasters to prevent this from happening,
Strange if I go to that link directly it just displayed the small image and no alert so I downloaded it using Orbit and no detection, only when I scanned it with ashQuick.exe did I get an alert.
I have submitted it as a false positive, based on the VT results.