


/multibootfinal-58dc10785f9b58468332f33b-5be9e714c9e77c005105e3fd.jpg)
The tag DefineSceneAndFrameLabelData is defined by Adobe specification as a record header (type 86) followed by the number of scenes (N), followed with a frame offset and a scene name for all N scenes. The output provided by swfdump tool (which is part of a toolset SWFTools) suggests that the file has 2 streams in the DefineSceneAndFrameLabelData tags. Let's have a look into the binary contents of an SWF file pulled from one of the infected web sites. As per initial SecurityFocus/Symantec assessment, there are from 20,000 to 250,000 web pages currently affected with this exploit.
