lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu Dec 29 14:23:14 2005
From: toddtowles at brookshires.com (Todd Towles)
Subject: test this

Got a new test of it this morning? I am surprised Norton doesn't have it
yet.

 TrendMicro has released pattern file = 3.135.00

It appears to pick up all the trojans using the WMF exploit as of right
now. Variants could affect this however.

Is this buffer overflow pretty specific like the older GIF exploit? If I
remember correctly, there were really only two ways to make the GIF
exploit work, so the detection was pretty solid. Is this exploit
similar? Or does it have some trick point that could be used to fool
known sigs?

-Todd

> -----Original Message-----
> From: full-disclosure-bounces@...ts.grok.org.uk 
> [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf 
> Of Thierry Zoller
> Sent: Wednesday, December 28, 2005 5:24 PM
> To: full-disclosure@...ts.grok.org.uk
> Subject: Re[2]: [Full-disclosure] test this
> 
> Dear List,
> 
> VirusTotal on 12/29/2005 at 00:16:19 (CET) :
> AntiVir 6.33.0.70       12.28.2005      TR/Dldr.WMF.Agent.D
> Sophos  4.01.0          12.28.2005      Troj/DownLdr-NO
> ClamAV  devel-20051108  12.29.2005      Exploit.WMF.A
> 
> --
> http://secdev.zoller.lu
> Thierry Zoller
> Fingerprint : 5D84 BFDC CD36 A951 2C45  2E57 28B3 75DD 0AC6 F1C7
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ