[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8e5ffb560608150822kab4f1ceh571e3d2ddc87f8bf@mail.gmail.com>
Date: Tue, 15 Aug 2006 21:07:39 +0545
From: "Bipin Gautam" <gautam.bipin@...il.com>
To: "Paul Schmehl" <pauls@...allas.edu>
Cc: "Dmitry Yu. Bolkhovityanov" <D.Yu.Bolkhovityanov@....nsk.su>,
"Thomas D." <whistl0r@...glemail.com>, bugtraq@...urityfocus.com,
full-disclosure@...ts.grok.org.uk
Subject: Re: RE: when will AV vendors fix this???
I'd still argue... If the malicious code is a known variant and
recides in the computer exploiting the stated flaw, here are ppl.
argueing the AV will catch it during execution anyways. BUT there are
many scenerios when ADVANCE HERCULES SCAN, suspecious activity scans
etc are only (mostly) enabled for testing DURING MANUAL SCANS as
having those enabled during auto protect would cause significant
preformance problems. (think of this scenerio again)
& lastly... NOD32 has an option to scan inside ADS too.
guys..... could anyone suggest any AV that isn't buggy to this trick?
-----
on vacation,
-bipin
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists