| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAANASp/bip1hHgg1O1cfiAEPCgAAAEAAAAMe2uSBy+4FPtp0wLuc/NmABAAAAAA==@online.gateway.strangled.net>
Date: Wed Nov 16 12:20:33 2005
From: aditya.deshmukh at online.gateway.strangled.net (Aditya Deshmukh)
Subject: another filename bypass vulnerability - from
cmd.exe
Was doing some testing [xfocus-AD-051115]
Ie Multiple antivirus failed to scan
malicous filename bypass vulnerability
The system is windows 2000 sp4 srp5 with
all other patches upto date.
At the command prompt cmd.exe execute
the following with the results.
I copy and paste from cmd.exe
-------------------------------------------------------------------
E:\TEMP>cd test
E:\TEMP\test>copy %windir%\system32\calc.exe
1 file(s) copied.
E:\TEMP\test>ren calc.exe calc.exe.zip
E:\TEMP\test>dir /b
calc.exe.zip
E:\TEMP\test>calc.exe.zip
E:\TEMP\test>
-------------------------------------------------------------------
This bring up the calc.exe on the screen.
________________________________________________________________________
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)