H
Howard Harris
Apparently only KAV and a-v based on the KAV engine such as eScan AntiVirus
Toolkit Utility identify the AP4.jpg file
http://slashdot.org/comments.pl?sid=122855&cid=10327905 recently released
as an apparent demonstration of how to exploit the issues addressed by
MS04-028 - Buffer Overrun in JPEG Processing (GDI+) as an infected file,
infected by "Exploit.IE.Crashsos" Virus.
There is an interesting discussion on the file in question AP4.jpg in
rec.photo.digital, with the following being perhaps the most relevant
observation:
"I just build the 6a JPEG library from the IJG sources and ran it on the
AP4.jpg image through a debugger. The offending code writes data to a
non-allocated buffer. I.e it writes to a pointer pointing out in space.
That is NOT a buffer overrun issue.
Moreover, what is written is the output from the inverse DCT. That is NOT
executable code from an untrusted source. Hence it is not a security
issue."
The following link is to the message from which I have quoted.
http://groups.google.com/[email protected]
Is this, then, a case of a good false positive? I think I would prefer my
a-v programme to alert me to a file that is intended to crash IE, rather
than to apply an abstract principle and not warn me at all that anything is
untoward. The former may violate purist a-v detecting principles, but is it
not better than the latter which just stands by unmoved while my browser
crashes?
Toolkit Utility identify the AP4.jpg file
http://slashdot.org/comments.pl?sid=122855&cid=10327905 recently released
as an apparent demonstration of how to exploit the issues addressed by
MS04-028 - Buffer Overrun in JPEG Processing (GDI+) as an infected file,
infected by "Exploit.IE.Crashsos" Virus.
There is an interesting discussion on the file in question AP4.jpg in
rec.photo.digital, with the following being perhaps the most relevant
observation:
"I just build the 6a JPEG library from the IJG sources and ran it on the
AP4.jpg image through a debugger. The offending code writes data to a
non-allocated buffer. I.e it writes to a pointer pointing out in space.
That is NOT a buffer overrun issue.
Moreover, what is written is the output from the inverse DCT. That is NOT
executable code from an untrusted source. Hence it is not a security
issue."
The following link is to the message from which I have quoted.
http://groups.google.com/[email protected]
Is this, then, a case of a good false positive? I think I would prefer my
a-v programme to alert me to a file that is intended to crash IE, rather
than to apply an abstract principle and not warn me at all that anything is
untoward. The former may violate purist a-v detecting principles, but is it
not better than the latter which just stands by unmoved while my browser
crashes?