lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: nick at virus-l.demon.co.uk (Nick FitzGerald)
Subject: WinAmp <=5.01 - Multiple Vulnerabilities

"Keith Pachulski" <keithp@...p.ptd.net> wrote:

> wow -- uber leet

Unlike subscribing to a full disclosure security list from behind a 
virus-scanning gateway then publicly posting your "surprise" at having 
some posts stopped by the virus scanner...

> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com <<...>>
> Sent: Thursday, March 25, 2004 3:04 AM
> To: full-disclosure
> Subject: [Full-Disclosure] WinAmp <=5.01 - Multiple Vulnerabilities
> 
> ANTI-VIRUS DETECTION ALERT
> 
> The anti-virus scanner was triggered by this file. The file was not
> cleaned and has been removed. See your system administrator for further
> information. 
> 
> Context: '[Message Body]'
> Detection(s): 'Exploit-CodeBase.gen (trojan)'

If you go to the web archive of the list and look at the original 
message, you will most likely find that the last two ro three lines of 
the PoC were to blame for this "detection".


-- 
Nick FitzGerald
Computer Virus Consulting Ltd.
Ph/FAX: +64 3 3529854


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ