lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20041002023749.7045.qmail@web20226.mail.yahoo.com>
From: visitbipin at yahoo.com (bipin gautam)
Subject: All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

All Antivirus, Trojan, Spy ware scanner, Nested file
manual scan bypass bugs. [Part IV]

Risk Level: Medium
Affected Product: (Should be) all Antivirus, Trojan,
Spy ware scanners for windows.

Description:
------------

A malicious code can reside in a computer (with users
privilage) bypassing "manual scans" of any
Antivirus, Trojan & Spy ware scanners by simply
issuing this command to itself.

cacls hUNT.exe /T /C /P dumb_user:R

...this is only due to the design fault in Microsoft
Windows, the way it handles NTFS permission.By this
way... any software’s with even Admin./SYSTEM
privilege can't access this file (hUNT.exe) normally
because the only person who has normal access to this
file is "dumb_user"

No wonder, there are several false assumptions in
windows security configuration as well, when a JOE
administrator could permenantly lock himself up in his
own machine.

regards,
Bipin Gautam
http://www.geocities.com/visitbipin
 

 

Disclaimer: The information in the advisory is
believed to be accurate at the time of printing based
on currently available information. Use of the
information constitutes acceptance for use in an AS IS
condition. There are no warranties with regard to this
information. Neither the author nor the publisher
accepts any liability for any direct, indirect or
consequential loss or damage arising from use of, or
reliance on this information.


		
__________________________________
Do you Yahoo!?
Yahoo! Mail - 50x more storage than other providers!
http://promotions.yahoo.com/new_mail


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ