On Fri, 24 Sep 2004 [EMAIL PROTECTED] wrote:

; Hi All,
;
; I've done done my *first* ndb sigs for some of the current windows expolits:
;
; JS.dragdrop.1:3:*:64796E7372633D22*2E65786522
; JS.dragdrop.2:3:*:666F6C6465723D227368656C6C??7374617274757022
; exploit.jpg:5:*:FFD8FF(E0|FE)*FFFE00(00|01)
;
; They need testing I guess... but no problems here... so far.

Slight modification to the last one. The new .ndb file allows the
signature offset to be defined, so instead of * in the third field you
should put 0 to anchor the JPEG magic number to the start of the file.

The 5 means it is definitely a graphics file before it is checked against
the signature but that encompasses more than just JPEGs.

I'm using Exploit.MS04-028:5:0:ffd8ff(e0|fe)*fffe00(00|01) here which
works fine for me.

A quick question for the database maintainers though - are you planning to
add a signature for this exploit (particularly now that an exploit toolkit
exists) ? All of my commercial scanners here now detect it - F-Prot even
released a new version yesterday to specifically catch it.

Thanks,

Andy


-------------------------------------------------------
This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170
Project Admins to receive an Apple iPod Mini FREE for your judgement on
who ports your project to Linux PPC the best. Sponsored by IBM.
Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to