Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-18 Thread Julio Canto
Tomasz Kojm wrote: b) VirusTotal's site has a more up to date version of ClamAV, using the builds from here (now and again): http://www.sosdg.org/clamav-win32/index.php I don't think so, it seems they're using ClamWin. Yes, all AV products in VirusTotal are Windows based, that is why we

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-18 Thread Meni Shapiro
Bogusaw Brandys wrote: Steve Basford wrote: Just use http://www.virustotal.com/ - excellent resource for scanning suspicious files with multiple engines at once. As mentioned in the They did not catch it!!!

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-18 Thread Brian Morrison
On Mon, 18 Oct 2004 11:22:01 +0200 in [EMAIL PROTECTED] Tomasz Kojm [EMAIL PROTECTED] wrote: For those running 0.80rc4 or 0.80 final, you can catch all jpeg exploits with the following signature (add it to a local.ndb file in your database directory):

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-18 Thread Trog
On Mon, 2004-10-18 at 15:40, Brian Morrison wrote: On Mon, 18 Oct 2004 11:22:01 +0200 in [EMAIL PROTECTED] Tomasz Kojm [EMAIL PROTECTED] wrote: For those running 0.80rc4 or 0.80 final, you can catch all jpeg exploits with the following signature (add it to a local.ndb file in

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-18 Thread Damian Menscher
On Mon, 18 Oct 2004, Trog wrote: On Mon, 2004-10-18 at 15:40, Brian Morrison wrote: On Mon, 18 Oct 2004 11:22:01 +0200 Tomasz Kojm [EMAIL PROTECTED] wrote: For those running 0.80rc4 or 0.80 final, you can catch all jpeg exploits with the following signature (add it to a local.ndb file in your

[Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Steve Basford
Hi, Can someone test ClamAV with these files: http://www.hiddenbit.org/demo_files/jpeg.zip Source: http://lists.netsys.com/pipermail/full-disclosure/2004-October/027530.html Cheers, Steve ___

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Christopher X. Candreva
On Sun, 17 Oct 2004, Steve Basford wrote: Hi, Can someone test ClamAV with these files: http://www.hiddenbit.org/demo_files/jpeg.zip [westnet]:~$ clamdscan - jpeg.zip stream: OK --- SCAN SUMMARY --- Infected files: 0 Time: 0.113 sec (0 m 0 s) Running 20041017 snap

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Vernon A. Fort
Vernon A. Fort wrote: Steve Basford wrote: Hi, Can someone test ClamAV with these files: http://www.hiddenbit.org/demo_files/jpeg.zip Source: http://lists.netsys.com/pipermail/full-disclosure/2004-October/027530.html Cheers, Steve ___

RE: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread sk3tch
Tested with McAfee uvscan, Avgscan, clamscan. Only uvscan detected a virus Found the Exploit-MS04-028 trojan !!! I also have sophos but not currently installed. I tested both on the uncompress zip and uncompressed. Again, only McAcee Uvscan detected anything. Vernon Just use

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Bogusaw Brandys
Hi, Vernon A. Fort wrote: Vernon A. Fort wrote: Steve Basford wrote: Hi, Can someone test ClamAV with these files: http://www.hiddenbit.org/demo_files/jpeg.zip Source: http://lists.netsys.com/pipermail/full-disclosure/2004-October/027530.html Cheers, Steve

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Steve Basford
Just use http://www.virustotal.com/ - excellent resource for scanning suspicious files with multiple engines at once. As mentioned in the Thanks all for the checking... as a extra site to bookmark, this site is good too: http://virusscan.jotti.dhs.org/ ( Jotti's malware scan: samples are added

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Bogusaw Brandys
Steve Basford wrote: Just use http://www.virustotal.com/ - excellent resource for scanning suspicious files with multiple engines at once. As mentioned in the Thanks all for the checking... as a extra site to bookmark, this site is good too: http://virusscan.jotti.dhs.org/ ( Jotti's malware

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Steve Basford
Thanks Jotti ! Really awesome site ! Good work! It's a very useful site, along with VirusTotal's site. Before I go anymore off-topic, just two points to note: a) Jotii isn't running the very lastest CVS version, he will only run the lastest STABLE version, so it won't cope too well with the

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Tomasz Kojm
On Sun, 17 Oct 2004 21:14:00 +0100 Steve Basford [EMAIL PROTECTED] wrote: b) VirusTotal's site has a more up to date version of ClamAV, using the builds from here (now and again): http://www.sosdg.org/clamav-win32/index.php I don't think so, it seems they're using ClamWin. -- oo

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Niek
On 10/17/2004 10:14 PM +0200, Steve Basford wrote: Thanks Jotti ! Really awesome site ! Good work! It's a very useful site, along with VirusTotal's site. Before I go anymore off-topic, just two points to note: a) Jotii isn't running the very lastest CVS version, he will only run the lastest

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Tomasz Kojm
On Sun, 17 Oct 2004 21:36:22 -0500 (CDT) Damian Menscher [EMAIL PROTECTED] wrote: For those running 0.80rc4 or 0.80 final, you can catch all jpeg exploits with the following signature (add it to a local.ndb file in your database directory): Exploit.JPEG.Comment.FalsePos:5:0:ffd8ff

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread D Walsh
On Oct 17, 2004, at 22:49, Tomasz Kojm wrote: On Sun, 17 Oct 2004 21:36:22 -0500 (CDT) Damian Menscher [EMAIL PROTECTED] wrote: For those running 0.80rc4 or 0.80 final, you can catch all jpeg exploits with the following signature (add it to a local.ndb file in your database directory):

Re: [Clamav-users] GDI+ bug exploit Mutations

2004-10-17 Thread Damian Menscher
On Sun, 17 Oct 2004, D Walsh wrote: On Oct 17, 2004, at 22:49, Tomasz Kojm wrote: On Sun, 17 Oct 2004 21:36:22 -0500 (CDT) Damian Menscher [EMAIL PROTECTED] wrote: For those running 0.80rc4 or 0.80 final, you can catch all jpeg exploits with the following signature (add it to a local.ndb file in