lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAANASp/bip1hHgg1O1cfiAEPCgAAAEAAAAMe2uSBy+4FPtp0wLuc/NmABAAAAAA==@online.gateway.strangled.net> Date: Wed Nov 16 12:20:33 2005 From: aditya.deshmukh at online.gateway.strangled.net (Aditya Deshmukh) Subject: another filename bypass vulnerability - from cmd.exe Was doing some testing [xfocus-AD-051115] Ie Multiple antivirus failed to scan malicous filename bypass vulnerability The system is windows 2000 sp4 srp5 with all other patches upto date. At the command prompt cmd.exe execute the following with the results. I copy and paste from cmd.exe ------------------------------------------------------------------- E:\TEMP>cd test E:\TEMP\test>copy %windir%\system32\calc.exe 1 file(s) copied. E:\TEMP\test>ren calc.exe calc.exe.zip E:\TEMP\test>dir /b calc.exe.zip E:\TEMP\test>calc.exe.zip E:\TEMP\test> ------------------------------------------------------------------- This bring up the calc.exe on the screen. ________________________________________________________________________ Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)