lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050312094024.24931.qmail@www.securityfocus.com>
Date: 12 Mar 2005 09:40:24 -0000
From: Bipin Gautam <visitbipin@...mail.com>
To: bugtraq@...urityfocus.com
Subject: Av issues


In-Reply-To: <20050311203150.17236.qmail@....securityfocus.com>

In Local file header if you modify "general purpose bit flag" 7th & 8'th byte of a zip archive with \x2f ie: "\" F-port, Kaspersky, Mcafee, Norman, Sybari, Symantec seem to skip the file marking it as clean!!! This was discovered during the analysis of "Multiple AV Vendor Incorrect CRC32 Bypass Vulnerability."
Quick/rough conclusion were drawn using www.virustotal.com

poc: http://www.geocities.com/visitbipin/gpbf.zip

Well, tested with F-prot, DrWeb, *Symantec 8.0 long ago... lately verified it using virustotal.com If you have a long archive coment... in a zip archive these AV can't detect virus embedded in it. I came to know Symantec 8.1 is immune to the bug?

POC: http://www.geocities.com/visitbipin/long_coment.zip

regards,
bipin gautam


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ