|
BugTraq
eSafe: Could this be exploited? Jul 23 2004 06:21PM Hugo van der Kooij (hvdkooij vanderkooij org) (3 replies) Re: eSafe: Could this be exploited? Jul 24 2004 11:27AM 3APA3A (3APA3A SECURITY NNOV RU) (2 replies) Re: eSafe: Could this be exploited? Jul 26 2004 05:26AM MegaHz (megahz gmail com) (1 replies) Re: eSafe: Could this be exploited? Jul 26 2004 08:26PM Hugo van der Kooij (hvdkooij vanderkooij org) (1 replies) Re: eSafe: Could this be exploited? Jul 25 2004 02:24PM Andreas Constantinides (MegaHz) (megahz megahz org) Re: eSafe: Could this be exploited? Jul 23 2004 07:49PM Oliver (at) greyhat (dot) de [email concealed] (Oliver greyhat de) |
|
Privacy Statement |
>
> If someone is able to create a test executable based on the EICAR
> string
> the point might be proven. Unfortunatly I am not a programmer and lack
> window compiler tools all together. But if someone thinks (s)he can
> create
> a sample binary that may run when the last bit is shot to pieces and
> still
> contain a valid EICAR definition to show to the screen the issue might
> be
> proven.
>
Just an idle thought, but what about scripting? Would it be possible to
get some simple scripts through simply by making a large portion of the
end of the message useless comment fields? Maybe even a worm that
rewrites this 'noise' every time to make a moving target?
[ reply ]