JPEG Virus
Spicer, Kevin
Kevin.Spicer at BMRB.CO.UK
Tue Sep 28 17:02:03 IST 2004
-----Original Message-----
From: Matt Kehler [mailto:mkehler at WRHA.MB.CA]
>>ClamAV 0.80rc3 successfuly detects JPEG files with modified comment
>>section that allows attackers to remotely execute arbitrary code on
>>>
>I assume this means it will work 'out of the box', and the comment
section it talks
>about is *already* modified? Its not too clear on that, and the
website doesn't say.
The comment section it refers to is the embedded comment section in a
jpeg file. The exploit works because the jpeg specification specifies
that a comment starts with the values fffe (2 bytes in hex) followed by
two bytes which indicate the length of the comment. The two byte length
field is included in the total length, therefore the minimum length is
two bytes. The expolit works by setting the indicated length to an
invalid 0 or 1 bytes.
BMRB International
http://www.bmrb.co.uk
+44 (0)20 8566 5000
_________________________________________________________________
This message (and any attachment) is intended only for the
recipient and may contain confidential and/or privileged
material. If you have received this in error, please contact the
sender and delete this message immediately. Disclosure, copying
or other action taken in respect of this email or in
reliance on it is prohibited. BMRB International Limited
accepts no liability in relation to any personal emails, or
content of any email which does not directly relate to our
business.
------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).
More information about the MailScanner
mailing list