Got a new test of it this morning? I am surprised Norton doesn't have it yet.
TrendMicro has released pattern file = 3.135.00 It appears to pick up all the trojans using the WMF exploit as of right now. Variants could affect this however. Is this buffer overflow pretty specific like the older GIF exploit? If I remember correctly, there were really only two ways to make the GIF exploit work, so the detection was pretty solid. Is this exploit similar? Or does it have some trick point that could be used to fool known sigs? -Todd > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf > Of Thierry Zoller > Sent: Wednesday, December 28, 2005 5:24 PM > To: [email protected] > Subject: Re[2]: [Full-disclosure] test this > > Dear List, > > VirusTotal on 12/29/2005 at 00:16:19 (CET) : > AntiVir 6.33.0.70 12.28.2005 TR/Dldr.WMF.Agent.D > Sophos 4.01.0 12.28.2005 Troj/DownLdr-NO > ClamAV devel-20051108 12.29.2005 Exploit.WMF.A > > -- > http://secdev.zoller.lu > Thierry Zoller > Fingerprint : 5D84 BFDC CD36 A951 2C45 2E57 28B3 75DD 0AC6 F1C7 > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
