Re: eSafe: Could this be exploited?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 26 Jul 2004, at 21:26, Hugo van der Kooij wrote:

If someone is able to create a test executable based on the EICAR string
the point might be proven. Unfortunatly I am not a programmer and lack
window compiler tools all together. But if someone thinks (s)he can create
a sample binary that may run when the last bit is shot to pieces and still
contain a valid EICAR definition to show to the screen the issue might be
proven.


Just an idle thought, but what about scripting? Would it be possible to get some simple scripts through simply by making a large portion of the end of the message useless comment fields? Maybe even a worm that rewrites this 'noise' every time to make a moving target?


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux