what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Multiple Anti-Virus Bypass Vulnerability

Multiple Anti-Virus Bypass Vulnerability
Posted Dec 9, 2008
Authored by DATA_SNIPER

Multiple Anti-Virus vendors suffer from a malicious webpage detection bypass vulnerability.

tags | advisory, virus, bypass
SHA-256 | f9dfa7e4d1f5008192bc17bb6b43ec0be0a51b5cc1e9623349686dfec0b9b2c1

Multiple Anti-Virus Bypass Vulnerability

Change Mirror Download
********************************************************************************************
Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass
hackers.
NOTIFICATION:
this exploit are based on Andrey Bayora "magic of magic byte" but with some development.
This proof of concept was created for educational purposes only,Use the code it at your own risk.
The author will not be responsible for any damages.
*********************************************************************************************
Exploit Information:
Date: 2008/19/08
Impact: baypassing the Detection of Malicious web page that can compromise a user's system
Vulnerabled AV-Software:
ESET Smart Security latest version. <== The exploit was dedicated to it.
AhnLab-V3 2008.9.13.0
AntiVir 7.8.1.28
AVG 8.0.0.161
CAT-QuickHeal 9.50
ClamAV 0.93.1
DrWeb 4.44.0.09170
eSafe 7.0.17.0
eTrust 31.6.6086
Ewido 4.0
Fortinet 3.113.0.0
Ikarus T3.1.1.34.0
K7AntiVirus 7.10.454
NOD32v2 3440
Norman 5.80.02
Panda 9.0.0.4
PCTools 4.4.2.0
Prevx1 V2
Rising 20.61.42.00
Sophos 4.33.0
Sunbelt 3.1.1633.1
Symantec 10
TheHacker 6.3.0.9.081
TrendMicro 8.700.0.1004
VBA32 3.12.8.5
ViRobot 2008.9.12.1375
VirusBuster 4.5.11.0
the things that must be considered that the POC it's variant from exploit to exploit(some times
Kaspersky and the other famous AV Sofware can be deceive).
Proof Of Concept:
as i said the exploit are based on the magic of magic byte methode we will first add the MZ Header to the HTML Exploit and change the exstention to txt or jpg or non extension,the exploit is compatible with IE6 and IE7 because IE6&7 execute the HTML Event if it's in txt file or non extension files.
so the exploit it's with corporate of IE6&7 :).
virustotal result of MS Internet Explorer (VML) Remote Buffer Overflow Exploit (XP SP2).
http://www.virustotal.com/fr/analisis/062ec3b8d8b88e99865f798cc08b0718
and this is a Variant one "obfuscated by this methode".
http://www.virustotal.com/fr/analisis/7db1bd321a1f945b4abfa73844c36d99
POC:
1-add the MZ Header to the HTML file:
MZگ ےے ¸ @ ط ؛ ´ ح!¸Lح!This program cannot be run in DOS mode.
you can put other EXE info on the HTML Body for more deception "showing in the second result".
-rename the HTML to non extension file or txt or jpg.
3-upload it to webserver.
http://localhost/mallpage.txt or http://localhost/mallpage<non extenstion>.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close