BugTraq
eSafe: Could this be exploited? Jul 23 2004 06:21PM
Hugo van der Kooij (hvdkooij vanderkooij org) (3 replies)
Re: eSafe: Could this be exploited? Jul 24 2004 11:27AM
3APA3A (3APA3A SECURITY NNOV RU) (2 replies)
Re: eSafe: Could this be exploited? Jul 26 2004 05:26AM
MegaHz (megahz gmail com) (1 replies)
Re: eSafe: Could this be exploited? Jul 26 2004 08:26PM
Hugo van der Kooij (hvdkooij vanderkooij org) (1 replies)
Re: eSafe: Could this be exploited? Jul 28 2004 09:30AM
Kev Ford (kev frod co uk) (1 replies)
Re: eSafe: Could this be exploited? Jul 30 2004 12:34AM
Nick FitzGerald (nick virus-l demon co uk)
Kev Ford wrote:

> Just an idle thought, but what about scripting? Would it be possible to
> get some simple scripts through simply by making a large portion of the
> end of the message useless comment fields? Maybe even a worm that
> rewrites this 'noise' every time to make a moving target?

Yep, but it need not even be that deliberate.

Windows VBS with its ever so forgiving "resume next" "error handler",
and some other "resilient" scripting languages (such as mIRC script),
means that even some badly truncated malware can be executed
"successfully", so long as the "important" part(s) of its functionality
are nearer the beginning of the script code than the end. Scripts in
such languages that get rogered through partial transmission (this was
very common with early mIRC script viruses) can keep on going in their
new, truncated forms until they finally get chopped before the minimal
code point that makes them replicative.

And yes, we have seen this happen in the wild many times already.

--
Nick FitzGerald
Computer Virus Consulting Ltd.
Ph/FAX: +64 3 3529854

[ reply ]
Re: eSafe: Could this be exploited? Jul 25 2004 02:24PM
Andreas Constantinides (MegaHz) (megahz megahz org)
Re: eSafe: Could this be exploited? Jul 24 2004 01:22AM
Nick FitzGerald (nick virus-l demon co uk)
Re: eSafe: Could this be exploited? Jul 23 2004 07:49PM
Oliver (at) greyhat (dot) de [email concealed] (Oliver greyhat de)


 

Privacy Statement
Copyright 2010, SecurityFocus