skip to main | skip to sidebar
Where facts are few, experts are many
  • Home
  • Menu
    • About Me
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
  • Contact
    • Mail
  • Subscribe to Feed
Advisories : AVG, F-prot, Trendmicro(update)
| 0 comments ]

  • [TZO-20-2009] AVG ZIP bypass / evasion
  • [TZO-21-2009] F-Prot CAB bypass / evasion
  • [TZO-172009] Trendmicro RAR,ZIP,CAB evasion (update)



0 comments

Post a Comment

Newer Post Older Post Home

About Me

My photo
Thierry Zoller
Welcome to my blog covering Information Security and Privacy.



Former Amazon, HSBC, Verizon - Alumnus

Quick-links
▪ About me
▪ Tools / Talks / Whitepapers
▪ Vulnerability disclosure policy
▪ Subsribe to RSS Feed

View my complete profile

  • Follow me on Twitter
  • Follow me on Linked-in

  • The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.

    Total Pageviews

    Blog Archive

    • ►  2020 (13)
      • ►  October (1)
      • ►  August (1)
      • ►  July (4)
      • ►  May (2)
      • ►  April (2)
      • ►  March (1)
      • ►  January (2)
    • ►  2017 (1)
      • ►  October (1)
    • ►  2013 (4)
      • ►  July (1)
      • ►  June (1)
      • ►  March (2)
    • ►  2012 (11)
      • ►  November (1)
      • ►  August (2)
      • ►  July (1)
      • ►  June (4)
      • ►  May (2)
      • ►  March (1)
    • ►  2011 (10)
      • ►  December (3)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
    • ►  2010 (6)
      • ►  August (1)
      • ►  July (1)
      • ►  March (2)
      • ►  February (2)
    • ▼  2009 (80)
      • ►  November (2)
      • ►  October (1)
      • ►  September (3)
      • ►  July (3)
      • ►  June (2)
      • ▼  May (22)
        • Correlated list of advisories
        • Advisory - Firefox Denial of service (Keygen)
        • About the different risk ratings of Anti-virus byp...
        • Advisories - Firefox DoS (unclamped loop)
        • IIS 5 / IIS 5.1 / IIS 6 Webdav unicode - the bug t...
        • RSA and DSA - misconceptions and usefull information
        • Advisories : Panda multiple evasions
        • Advisories - Avira, Bitdefender generic PDF evasion
        • Advisory: Clamav generic evasion (CAB)
        • Advisory : F-Prot - Generic evasion (RAR,ARJ,LHA)
        • Advisory - Clamav generic bypass (RAR,CAB,ZIP)
        • F-prot generic evasion (TAR)
        • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
        • Advisory : Apple Safari remote code execution
        • Advisory: Apple Safari & Quicktime DoS
        • Advisory : Frisk F-prot evasion (TAR)
        • Advisory : Norman generic evasion (RAR)
        • Advisory - Ikarus multiple generic evasions
        • The myth of the untrusted Insider, the 80% lie - b...
        • 100th post : What about the big guys (Symantec,IBM...
        • Advisory : Kaspersky generic PDF evasion
        • Advisories : AVG, F-prot, Trendmicro(update)
      • ►  April (16)
      • ►  March (17)
      • ►  February (7)
      • ►  January (7)
    • ►  2008 (31)
      • ►  December (2)
      • ►  November (7)
      • ►  October (7)
      • ►  September (3)
      • ►  August (12)
    • ►  2007 (7)
      • ►  October (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2006 (6)
      • ►  December (1)
      • ►  August (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2005 (9)
      • ►  October (1)
      • ►  April (7)
      • ►  January (1)
    • ►  2000 (1)
      • ►  March (1)

    Featured Post

    A Primer on dealing with the DPA of Luxembourg - the CNPD

    This blog post will be updated periodically as I come across new practical information and experiences. You can subscribe to my blog if you ...

    Popular Posts

    • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
      Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...
    • How to effectively evade the GDPR and the reach of the DPA ? (RocketReach PART 2)
      This is a follow-up to my previous blog post entitled " How to effectively evade the GDPR  and the reach of the DPA ". Head over ...
    • Advisory : Firefox Denial of Service (KEYGEN)
      Comment: I have received interesting and mixed feedback from posting the above "bug". First I'd like to clarify that a vuln...
    • Advisory : F-Prot (Frisk) - CAB bypass / evasions
      CHEAP Plug : ************ You are invited to participate in HACK.LU 2009, a small but concentrated luxemburgish security conference. More ...
    • SSL Audit v.08 released
      I have updated my little TLS/SSL Scanner called "SSL Audit" to version 0.8. I tweaked it slightly but the tool is still based o...

    Blogs I read

    • Schneier on Security
      2022 Workshop on Economics and Information Security (WEIS) - I did not attend WEIS this year, but Ross Anderson was there and liveblogged all the talks.
      6 hours ago
    • Didier Stevens
      Quickpost: Cracking PDF Owner Passwords - I added code to John the Ripper to crack PDF owner passwords (JtR cracks PDF user passwords only). Source code can be found here. Compiled Windows (Cygwin)...
      18 hours ago
    • Cup of Security
      Chocolate Cookies and Cream Cheesecakes - #Chocolate #Cookies #and #Cream #Cheesecakes
      22 hours ago
    • Troy Hunt
      Weekly Update 301 - First up, I'm *really *sorry about the audio quality on this one. It's the exact same setup I used last week (and carefully tested first) but it's obviou...
      2 days ago
    • Krebs on Security
      Meet the Administrators of the RSOCKS Proxy Botnet - Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the "RSOCKS" botnet, a collection of millions of hac...
      5 days ago
    • A Few Thoughts on Cryptographic Engineering
      In defense of crypto(currency) - Last week a group of technologists, including Bruce Schneier, sent a letter to Congress outlining their concerns around cryptocurrency and urging Congress ...
      2 weeks ago
    • Securosis Highlights
      SOC 2025: Operationalizing the SOC - Posted under: Research and Analysis So far in this series, we’ve discussed the challenges of security operations, making sense of security data, and refin...
      2 months ago
    • VRT
      Attackers use domain fronting technique to target Myanmar with Cobalt Strike - By Chetan Raghuprasad, Vanja Svajcer and Asheer Malhotra. News Summary Cisco Talos discovered a new malicious campaign using a leaked version of Cobalt Str...
      7 months ago
    • Chatter on the Wire: How excessive network traffic gives away too much!
      Satori Updates - I've continued to update Satori little by little out there on github. Both updating the underlying code and fingerprints. Always happy to have new id...
      7 months ago
    • Lenny Zeltser on Information Security
      How to Ask Questions to Succeed with Security Projects - No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details are missing. Yet, we often hesitat...
      8 months ago
    • TaoSecurity
      Zeek in Action Videos - This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project. Each video addre...
      10 months ago
    • Uncommon Sense Security
      Ten years, how time flies. - Ten years, a decade, it’s a very long time, and yet passes in the blink of an eye. I joined Tenable ten years ago, and somehow they have not tired of me ...
      1 year ago
    • CrySyS Blog
      The MELLODDY Project from a Privacy Point of View - In MELLODDY, several of the world’s largest pharmaceutical companies aim to leverage each other’s data by jointly training a multi-task machine learning mo...
      1 year ago
    • Security
      Recovering "lost" treasure-filled floppy discs with an oscilloscope - There are many good, modern solutions for reading data off old floppy discs and drives. Perhaps the best is the Greaseweazle: it's capable, open source, ...
      1 year ago
    • Privacy Law Blog
      The Future of the FTC: Part II - A previous blog post discussed FTC Chairwoman Slaughter’s first priority as the newly designated chairwoman – the COVID-19 pandemic. The FTC’s second prior...
      1 year ago
    • contagio
      2020-12-13 SUNBURST SolarWinds Backdoor samples - *Reference* I am sure you all saw the news. 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Glo...
      1 year ago
    • Carnal0wnage & Attack Research Blog
      WeirdAAL update - get EC2 snapshots - I watched a good DEF CON video on abusing public AWS Snapshots https://www.youtube.com/watch?v=-LGR63yCTts I, of course, wanted to check this out. There a...
      2 years ago
    • GreyHatHacker.NET
      Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google ...
      3 years ago
    • /dev/ttyS0
      Protected: TP-Link is Bullshit - There is no excerpt because this is a protected post.
      3 years ago
    • newsoft's fun blog
      SSTIC 2018 - Nous sommes en 2018. Fuites de données, attaques massives, failles structurelles, le monde constate chaque jour un peu plus à quel point la sécurité est ...
      4 years ago
    • root labs rdist
      In Which You Get a Chance to Save Democracy - Let’s start with the end: you can do something to change the broken political landscape in the United States, but you have to act quickly. Here’s a link to...
      4 years ago
    • Arne Swinnen's Security Blog - Just Another Infosec Blog
      Authentication bypass on Uber’s Single Sign-On via subdomain takeover - TL;DR: Uber was vulnerable to subdomain takeover on saostatic.uber.com via Amazon CloudFront CDN. Moreover, Uber’s recently deployed Single Sign-On (SSO) s...
      5 years ago
    • Claude Adam
      En français svp? - Mir stelle fest, datt graff vereinfacht, zu Lëtzebuerg 100.000 Lëtzebuerger schaffen, 100.000 net-Lëtzebuerger Residenten an 200.000 Frontalieren. Datt ënn...
      5 years ago
    • Adam Shostack & friends
      Rogue One Sequel already being filmed! - There’s some really interesting leaked photos and analysis by Charles Goodman. “Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoi...
      5 years ago
    • LuxLegal
      La réforme des allocations familiales : une nouvelle atteinte aux droits des familles recomposées ? - Alors que la Cour de Justice de l’Union Européenne est toujours saisie de litiges concernant des enfants étudiants issus de familles recomposées s’étant vu...
      5 years ago
    • Secure Belief
      VulnHub Stapler 1 Solution 2 - You can find Solution 1 here. After spending a night on this, I finally managed to solve the 2nd way to get limited shell on this box. Let's see how this ...
      6 years ago
    • Fun Over IP
      McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
      6 years ago
    • Scrammed!
      A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
      7 years ago
    • mossmann's blog
      Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
      7 years ago
    • Java security and related topics
      USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
      7 years ago
    • The iSecLab Blog [by Faculty and Students];
      New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
      8 years ago
    • Amrit Williams Blog
      RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
      8 years ago
    • ax330d's blog
      Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
      8 years ago
    • Cognitive Dissidents
      Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
      8 years ago
    • Ma petite parcelle d'Internet...
      Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
      8 years ago
    • Androguard
      One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
      8 years ago
    • Digital Forensics is a Science
      Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
      9 years ago
    • Nynaeve
      NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
      11 years ago
    • IBM Internet Security Systems Frequency X Blog
      -
    • CryptoLUX - Recent changes [en]
      -
    • rmhrisk.wpengine.com/
      -
    • Metasploit
      -
    • woanware
      -
    • ...And You Will Know me by the Trail of Bits
      -
    Show 10 Show All

    Links

    • Schneier on Security
    • Brian Krebs on Security
    • Lenny Zeltser
    • Malware LU
    • CryptoLux
    • Unmitigated Risk
    • TaoSecurity - Bejtlich
    • root labs rdist
    • Securosis Blog
    • Trail of Bits
    • Sid's Blog [FR]
    • Fun over IP
    • Hack.lu
    • Joe Sandbox
    • SVEN

    Labels

    • Advisory (53)
    • Rants from Thierry (25)
    • Tool (19)
    • Vulnerabilties (13)
    • Misc (10)
    • Interesting Reads (9)
    • 0day (7)
    • How-to (7)
    • Luxembourg (6)
    • Whitepaper (4)
    • Constitution (2)
    • Hardware hacking (2)
    • Data Privacy (1)
     
    Copyright Musings on Information Security and Data Privacy