Hi Kevin,

On Fri, Sep 17, 2004 at 07:59:51AM +0100, Kevin Spicer wrote:
> On Fri, 2004-09-17 at 03:02, Tomasz Kojm wrote:
> > > Okay, well I've found an easier to understand source...
> > > http://www.funducode.com/freec/Fileformats/format3/format3b.htm
> > > and it seems that the particular exploit byte sequence would be unique
> > > within jpeg files.  I've also tracked down docs on how to make a
> > > signature for clam, but it doesn't appear that its possible to form a
> > 
> > A new signature format that will be included in 0.80rc will allow on
> > advanced offset and target type specification, including JPEG images.
> 
> Cool, as ever you're one step ahead!
> 
> > > signature by detecting two distinct patterns in a file, or anchoring
> > 
> > With older clamav versions you can use HEX1*HEX2*...*HEXn
> 
> That doesn't anchor to the start of the file though (I guess I'd need to
> anchor the magic number to minimise false positives). I had just about
> guessed, by looking at the sig files after I posted, that the * was a
> wildcard (matching many bytes) and the ? a single unknown byte
> (correct?).  Perhaps this information could be added to signatures.pdf? 
> Is there a limit (and if so what is it) to how many bytes a * will
> match?  

0xFFFE is the comment Marker in a JPEG. So it's not that bad to
detect. It ist followed by the length field. With is where the
Problem occures. So you have to detect the following sequence from
the beginning of the JPEG.

ffd8 <- SoI marker
ffe0 <- APP0 marker
0010 <- lenght of APP0 including those 2 Bytes.
4a46 4946 00 <- string JFIF terminated with 0x00
010[012] <- common Version number. (May differ) -> 0?0?
0[012] <- NA; p/" ; p/cm   -> 0?
0010 <- vertical resolution  -> ????
0010 <- horizontal resolution -> ????
0000 <- preview resolution -> ????
fffe <- comment marker
000[01] <- bad comment length -> 000?

So assuming the ? character belongs to 4Bit a signature would look 
something like this.

Xploit.Name (Clam)=ffd8ffe000104a46494600?????????fffe0000
Xploit.Name (Clam)=ffd8ffe000104a46494600?????????fffe0001 

thats straight from the beginning but isn't long enoungh. And ClamAV
may produce false positives. Btw. the signatures don't work.

There should be a SoS Marker somewhere in the Image. 0xFFDA.
At the end of the Image there should be a EoI Marker 0xFFD9.

0xffc4 Huffmann Table, 0xffdb Quantization Table, 0xffc0 Start of Frame 
maybe also a good Idea to check.

Xploit.Name.better 
(Clam)=ffd8ffe000104a464946000?0?0?????????????fffe0000*ffdb*ffc0*ffc4*ffda*ffd9
Xploit.Name.better 
(Clam)=ffd8ffe000104a464946000?0?0?????????????fffe0001*ffdb*ffc0*ffc4*ffda*ffd9

That would be the signature for a plain JFIF File. No EXIF Tags. But
due to many ??? also not a valid Signature.

Xploit.Jpeg.Comment.2.FalsePositiv 
(Clam)=ffd8ffe000104a46494600*fffe0001*ffdb*ffc0*ffda*ffd9
Xploit.Jpeg.Comment.1.FalsePositiv 
(Clam)=ffd8ffe000104a46494600*fffe0000*ffdb*ffc0*ffda*ffd9

those two are valid and (IMHO) catch the xploit in JFIF and EXIF but may also 
produce false positives. Just test them.

Greetings Daniel
-- 
nur weil ihr paranoid seid heisst das noch lange nicht, 
dass sie nicht hinter euch her sind ;)


-------------------------------------------------------
This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170
Project Admins to receive an Apple iPod Mini FREE for your judgement on
who ports your project to Linux PPC the best. Sponsored by IBM.
Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to