BugTraq
eSafe: Could this be exploited? Jul 23 2004 06:21PM
Hugo van der Kooij (hvdkooij vanderkooij org) (3 replies)
Re: eSafe: Could this be exploited? Jul 24 2004 11:27AM
3APA3A (3APA3A SECURITY NNOV RU) (2 replies)
Re: eSafe: Could this be exploited? Jul 26 2004 05:26AM
MegaHz (megahz gmail com) (1 replies)
Re: eSafe: Could this be exploited? Jul 26 2004 08:26PM
Hugo van der Kooij (hvdkooij vanderkooij org) (1 replies)
Re: eSafe: Could this be exploited? Jul 28 2004 09:30AM
Kev Ford (kev frod co uk) (1 replies)
On 26 Jul 2004, at 21:26, Hugo van der Kooij wrote:
>
> If someone is able to create a test executable based on the EICAR
> string
> the point might be proven. Unfortunatly I am not a programmer and lack
> window compiler tools all together. But if someone thinks (s)he can
> create
> a sample binary that may run when the last bit is shot to pieces and
> still
> contain a valid EICAR definition to show to the screen the issue might
> be
> proven.
>
Just an idle thought, but what about scripting? Would it be possible to
get some simple scripts through simply by making a large portion of the
end of the message useless comment fields? Maybe even a worm that
rewrites this 'noise' every time to make a moving target?

[ reply ]
Re: eSafe: Could this be exploited? Jul 30 2004 12:34AM
Nick FitzGerald (nick virus-l demon co uk)
Re: eSafe: Could this be exploited? Jul 25 2004 02:24PM
Andreas Constantinides (MegaHz) (megahz megahz org)
Re: eSafe: Could this be exploited? Jul 24 2004 01:22AM
Nick FitzGerald (nick virus-l demon co uk)
Re: eSafe: Could this be exploited? Jul 23 2004 07:49PM
Oliver (at) greyhat (dot) de [email concealed] (Oliver greyhat de)


 

Privacy Statement
Copyright 2010, SecurityFocus