V
Versy Tyle
What's the name of the JPG virus blocker that Microsoft offer?
Thanks,
Versy
Thanks,
Versy
Versy Tyle said:What's the name of the JPG virus blocker that Microsoft offer?
Thanks,
Versy
Ionizer said:If you are referring to the vulnerability described in this bulletin:
http://www.microsoft.com/technet/security/bulletin/MS04-028.mspx Microsoft
offers a tool to scan your system for the vulnerable .dll files, but a
more comprehensive scanning tool is offered here:
http://isc.sans.org/gdiscan.php
Neither tool blocks the vulnerability- they only identify vulnerable
versions of the several .dll files which may be on your system.
Regards,
Ian.
Sanjaya said:How does a .jpg virus work? What can it, or does it, do?
Roger Wilco said:There is no such thing as a jpg virus. There is a vulnerability in the implementation of GDI Plus that allows arbitrary code
execution IIRC. A jpg can be crafted to exploit this vulnerability so you may eventually find a virus (or worm) that uses
it (maybe as a downloader trojan), but it is an exploit itself (and a "trojaned" JPG). For there to be a jpg virus, JPEGs
would have had to be designed to have executable content as a matter of course.That won't stop peeps from calling these
"jpg viruses" though.
implementation of GDI Plus that allows arbitrary codeRoger Wilco said:There is no such thing as a jpg virus. There is a vulnerability in the
may eventually find a virus (or worm) that usesexecution IIRC. A jpg can be crafted to exploit this vulnerability so you
"trojaned" JPG). For there to be a jpg virus, JPEGsit (maybe as a downloader trojan), but it is an exploit itself (and a
course.That won't stop peeps from calling thesewould have had to be designed to have executable content as a matter of
"jpg viruses" though.
Richard S. Westmoreland said:implementation of GDI Plus that allows arbitrary code
may eventually find a virus (or worm) that uses
"trojaned" JPG). For there to be a jpg virus, JPEGs
course.That won't stop peeps from calling these
I'm sorry but I have to disagree. If you can add the exploit into a jpeg,
you can also have excutable content that the exploit calls, which would
classify it as a legitimate infector file. If the executable routine in the
jpeg then looks for other jepgs and alters their files to do the same thing,
then this is no different than viruses that infect other EXE files that act
as the virus (like Chernoybl or Nimda).
I have already come across some websites that triggered the GDI+ exploit IDS
signature in my firewall, and I don't think the images on the pages were
intentionally altered to use this exploit. So I think we're already seeing
signs of what I described above.
More info about this can be found at:
http://www.antisource.com/article.php?story=20040921030750393
So far this year we have found that JPG, BMP, and PNGs are all possible
methods of malware propogation. :-(
Rick
Richard S. Westmoreland said:implementation of GDI Plus that allows arbitrary code
may eventually find a virus (or worm) that uses
"trojaned" JPG). For there to be a jpg virus, JPEGs
course.That won't stop peeps from calling these
I'm sorry but I have to disagree. If you can add the exploit into a jpeg,
you can also have excutable content that the exploit calls, which would
classify it as a legitimate infector file.
If the executable routine in the
jpeg then looks for other jepgs and alters their files to do the same thing,
then this is no different than viruses that infect other EXE files that act
as the virus (like Chernoybl or Nimda).
I have already come across some websites that triggered the GDI+ exploit IDS
signature in my firewall, and I don't think the images on the pages were
intentionally altered to use this exploit. So I think we're already seeing
signs of what I described above.
More info about this can be found at:
http://www.antisource.com/article.php?story=20040921030750393
So far this year we have found that JPG, BMP, and PNGs are all possible
methods of malware propogation. :-(
is a data format filetype and is not expected to beRoger Wilco said:Yes, then it is an exploit based worm - just not a jpg virus because JPEG
corrupts the data input that a program uses in suchexecutable. The code does not modify a program by adding itself to it, it
a way that it allows execution and recursion through exploit.
Richard said:I'm sorry but I have to disagree. If you can add the exploit into a jpeg,
you can also have excutable content that the exploit calls, which would
classify it as a legitimate infector file. If the executable routine in the
jpeg then looks for other jepgs and alters their files to do the same thing,
then this is no different than viruses that infect other EXE files that act
as the virus (like Chernoybl or Nimda).
Richard S. Westmoreland said:is a data format filetype and is not expected to be
corrupts the data input that a program uses in such
How would you classify Code Red? Or Volga?
I understand what you're pointing out, just picking your brain a little.
Versy said:What's the name of the JPG virus blocker that Microsoft offer?
Thanks,
Versy
Sanjaya said:How does a .jpg virus work? What can it, or does it, do?
fluidly said:Hi Versy,
A couple of notes on the GDI+/JPG exploit.
....fluidly said:Whether or not it is a virus (read above), it works by using bad/old
code libraries (DLLs) on a specially crafted JPG file.