On Thu, 16 Sep 2004 22:58:54 +0100
Kevin Spicer <[EMAIL PROTECTED]> wrote:

> On Thu, 2004-09-16 at 22:24, Kevin Spicer wrote:
> > It looks like there are two possible four byte sequences that can
> > trigger the exploit.  I guess this is probably too small to avoid an
> > unacceptable level of false positives(?)  Presumably this could be
> > combined with the 'magic' numbers for jpeg files to improve this,
> > but still maybe not narrow enough?  I'm trying to find out whether
> > there is a particular place the comment field occurs, but the
> > documentation is not very easy to understand without background
> > knowledge.
> 
> Okay, well I've found an easier to understand source...
> http://www.funducode.com/freec/Fileformats/format3/format3b.htm
> and it seems that the particular exploit byte sequence would be unique
> within jpeg files.  I've also tracked down docs on how to make a
> signature for clam, but it doesn't appear that its possible to form a

A new signature format that will be included in 0.80rc will allow on
advanced offset and target type specification, including JPEG images.

> signature by detecting two distinct patterns in a file, or anchoring

With older clamav versions you can use HEX1*HEX2*...*HEXn

-- 
   oo    .....         Tomasz Kojm <[EMAIL PROTECTED]>
  (\/)\.........         http://www.ClamAV.net/gpg/tkojm.gpg
     \..........._         0DCA5A08407D5288279DB43454822DC8985A444B
       //\   /\              Fri Sep 17 03:58:30 CEST 2004

Attachment: pgpVsfyOzqhcr.pgp
Description: PGP signature

Reply via email to