[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.21.0611080543360.15331-100000@linuxbox.org>
Date: Wed, 8 Nov 2006 05:49:11 -0600 (CST)
From: Gadi Evron <ge@...uxbox.org>
To: Code-Crunchers@...testar.linuxbox.org
Cc: full-disclosure@...ts.grok.org.uk
Subject: windows vulnerability? [was: Re: [Code-Crunchers]
137 bytes]
On Wed, 8 Nov 2006, onisan wrote:
> One thing is in this makes it even more interesting, most of the firewalls
> do not block this download, so it's smallest and most dangerous downloader
> at the same time :o
What Alex did is very impressive! Matthew Murphy came up with the idea
originally, I think, but it doesn't take from this amazing work in any
way.
*awe struck*
I'd say more though, it's a vulnerability.
If you can load a library remotely, and do so with no problems, it's a
vulnerability in Windows. I am not sure of what kind quite yet.
The mother of all downloaders.
"The Zone has a new King!" <we're not worthy x3>
-- Jeff, Coupling (BBC, UK).
Gadi.
> -- G
>
> 2006/11/8, Solar Eclipse <solareclipse@...eedom.org>:
> >
> > On Tue, Nov 07, 2006 at 10:56:42AM -0800, Peter Ferrie wrote:
> > > Why is the idata size present? AFAIK, no Windows version checks it.
> > > Four bytes shorter, then (stop at the idata rva non-zero byte)?
> >
> > You're right, you can remove the last field and bring the file size down
> > to 133 bytes. That's what I get for claiming that the size can't be
> > improved :-)
> >
> > Solar
> > _______________________________________________
> > Code-Crunchers mailing list
> > Code-Crunchers@...testar.linuxbox.org
> > http://whitestar.linuxbox.org/mailman/listinfo/code-crunchers
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists