skip to main | skip to sidebar
Where facts are few, experts are many
  • Home
  • Menu
    • About Me
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
  • Contact
    • Mail
  • Subscribe to Feed
Advisories - FPROT,Clamav
| 0 comments ]

Subscribe to the RSS feed in case you are interested in updates


  • [TZO-33-2009] FPROT generic bypass (TAR)
  • [TZO-40-2009] Clamav generic bypass (RAR,ZIP,CAB)
  • [TZO-34-2009] FPROT generic bypass (RAR,LHA,ARJ)
  • [TZO-43-2009] Clamav generic bypass (CAB)



Advisories: Apple, F-prot, Norman,Ikarus, Kaspersky
| 0 comments ]

Subscribe to the RSS feed in case you are interested in updates
  • [TZO-30-2009] Kaspersky generic PDF evasion (update: Kaspersky got in touch)
  • [TZO-31-2009] Ikarus generic evasion (ZIP,RAR,CAB)
  • [TZO-32-2009] Norman generic evasion (RAR)
  • [TZO-33-2009] F-Prot generic evasion (TAR)
  • [TZO-36-2009] Apple Safari & Quicktime Denial of Service
  • [TZO-37-2009] Apple Safari Remote code execution



Newer Posts Older Posts Home

About Me

My photo
Thierry Zoller
Welcome to my blog covering Information Security and Privacy.



Former Amazon, HSBC, Verizon - Alumnus

Quick-links
▪ About me
▪ Tools / Talks / Whitepapers
▪ Vulnerability disclosure policy
▪ Subsribe to RSS Feed

View my complete profile

  • Follow me on Twitter
  • Follow me on Linked-in

  • The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.

    Total Pageviews

    Blog Archive

    • ►  2020 (14)
      • ►  October (1)
      • ►  August (1)
      • ►  July (5)
      • ►  May (2)
      • ►  April (2)
      • ►  March (1)
      • ►  January (2)
    • ►  2017 (1)
      • ►  October (1)
    • ►  2013 (4)
      • ►  July (1)
      • ►  June (1)
      • ►  March (2)
    • ►  2012 (11)
      • ►  November (1)
      • ►  August (2)
      • ►  July (1)
      • ►  June (4)
      • ►  May (2)
      • ►  March (1)
    • ►  2011 (10)
      • ►  December (3)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
    • ►  2010 (6)
      • ►  August (1)
      • ►  July (1)
      • ►  March (2)
      • ►  February (2)
    • ▼  2009 (80)
      • ►  November (2)
      • ►  October (1)
      • ►  September (3)
      • ►  July (3)
      • ▼  June (2)
        • Advisories - FPROT,Clamav
        • Advisories: Apple, F-prot, Norman,Ikarus, Kaspersky
      • ►  May (22)
      • ►  April (16)
      • ►  March (17)
      • ►  February (7)
      • ►  January (7)
    • ►  2008 (31)
      • ►  December (2)
      • ►  November (7)
      • ►  October (7)
      • ►  September (3)
      • ►  August (12)
    • ►  2007 (7)
      • ►  October (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2006 (6)
      • ►  December (1)
      • ►  August (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2005 (9)
      • ►  October (1)
      • ►  April (7)
      • ►  January (1)
    • ►  2000 (1)
      • ►  March (1)

    Featured Post

    A Primer on dealing with the DPA of Luxembourg - the CNPD

    This blog post will be updated periodically as I come across new practical information and experiences. You can subscribe to my blog if you ...

    Be notified for new posts

    Popular Posts

    • How to effectively evade the GDPR and the reach of the DPA (CDPWE-0001) (PART 1)
      How to effectively evade the GDPR and the reach of the DPA (PART 1) This is a post in a series of posts : How to deal with the DPA of Luxem...
    • How Germany re-introduced border controls to Luxembourg
      Introduction As many of you know the Schengen Agreement (Named after the Luxemburg City "Schengen" where the initial contract was...
    • Advisories 2020
      This is a living post, that will be updated as I release Advisories. Updates: 02.01.2020 - Added Initial List of Advisories 09.01.2...
    • SSL Audit v.08 released
      I have updated my little TLS/SSL Scanner called "SSL Audit" to version 0.8. I tweaked it slightly but the tool is still based o...
    • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
      Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...

    Blogs I read

    • Krebs on Security
      Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails - Microsoft Corp. today released software updates to plug four critical security holes that attackers have been using to plunder email communications at comp...
      8 hours ago
    • Schneier on Security
      Mysterious Macintosh Malware - This is weird: Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So ...
      17 hours ago
    • Securosis Highlights
      Infrastructure Hygiene: Success and Consistency - Posted under: Research and Analysis We went through the risks and challenges of infrastructure hygiene, and then various approaches for fixing the vulnera...
      1 day ago
    • Troy Hunt
      Welcoming the Portuguese Government to Have I Been Pwned - I'm pleased to welcome the first new government onto Have I Been Pwned for 2021, Portugal. The Portuguese CSIRT, CERT.PT, now has full and free access to...
      1 day ago
    • Didier Stevens
      Overview of Content Published in February - Here is an overview of content I published in February: Blog posts: Update: oledump.py Version 0.0.59 Quickpost: oledump.py plugin_biff.py: Remove Sheet Pr...
      2 days ago
    • Privacy Law Blog
      The Future of the FTC: Part I - Ryan Blaney and Brooke Gottlieb On January 21, 2021, President Biden designated Federal Trade Commission (the “FTC”) Commissioner Rebecca Kelly Slaughter...
      6 days ago
    • Adam Shostack & friends
      Linkedin Learning - I am very excited to announce that Linkedin Learning has released “Threat Modeling: Denial of Service and Elevation of Privilege.” This is the sixth course...
      1 week ago
    • TaoSecurity
      Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - *Proposition* Digital offense capabilities are currently net negative for the security ecosystem.[0] The costs of improved digital offense currently ou...
      1 week ago
    • Uncommon Sense Security
      Finally, the results of the employer support survey - Delayed by holidays and the madness of the past month, but here it is. First, the very short summary: most of us in the security realm are pretty lucky t...
      5 weeks ago
    • CrySyS Blog
      Driver fingerprinting - When your driving style is as unique as your signature Perhaps it doesn’t come as a surprise that we all have unique driving styles. My father is a calm, s...
      1 month ago
    • Lenny Zeltser on Information Security
      How You Can Start Learning Malware Analysis - Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering...
      1 month ago
    • Security
      The cleverest floppy disc protection ever? Western Security Ltd. - Introduction I've been on a bit of a floppy disc protection odyssey recently. This will probably be the last floppy disc related post for some time, so how...
      2 months ago
    • contagio
      2020-12-13 SUNBURST SolarWinds Backdoor samples - *Reference* I am sure you all saw the news. 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Glo...
      2 months ago
    • A Few Thoughts on Cryptographic Engineering
      Ok Google: please publish your DKIM secret keys - The Internet is a dangerous place in the best of times. Sometimes Internet engineers find ways to mitigate the worst of these threats, and sometimes they f...
      3 months ago
    • Carnal0wnage & Attack Research Blog
      WeirdAAL update - get EC2 snapshots - I watched a good DEF CON video on abusing public AWS Snapshots https://www.youtube.com/watch?v=-LGR63yCTts I, of course, wanted to check this out. There a...
      9 months ago
    • Chatter on the Wire: How excessive network traffic gives away too much!
      Youtube channel - I've continued to make updates to the python version of satori and have put a lot of time in the past few weeks to updating fingerprints and fixing some mi...
      2 years ago
    • GreyHatHacker.NET
      Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google ...
      2 years ago
    • /dev/ttyS0
      Protected: TP-Link is Bullshit - There is no excerpt because this is a protected post.
      2 years ago
    • newsoft's fun blog
      SSTIC 2018 - Nous sommes en 2018. Fuites de données, attaques massives, failles structurelles, le monde constate chaque jour un peu plus à quel point la sécurité est ...
      2 years ago
    • root labs rdist
      In Which You Get a Chance to Save Democracy - Let’s start with the end: you can do something to change the broken political landscape in the United States, but you have to act quickly. Here’s a link to...
      3 years ago
    • Arne Swinnen's Security Blog - Just Another Infosec Blog
      Authentication bypass on Uber’s Single Sign-On via subdomain takeover - TL;DR: Uber was vulnerable to subdomain takeover on saostatic.uber.com via Amazon CloudFront CDN. Moreover, Uber’s recently deployed Single Sign-On (SSO) s...
      3 years ago
    • VRT
      Player 3 Has Entered the Game: Say Hello to 'WannaCry' - *This post was authored by Martin Lee, Warren Mercer, Paul Rascagneres, and Craig Williams.* Executive SummaryA major ransomware attack has affected many o...
      3 years ago
    • Claude Adam
      En français svp? - Mir stelle fest, datt graff vereinfacht, zu Lëtzebuerg 100.000 Lëtzebuerger schaffen, 100.000 net-Lëtzebuerger Residenten an 200.000 Frontalieren. Datt ënn...
      3 years ago
    • LuxLegal
      La réforme des allocations familiales : une nouvelle atteinte aux droits des familles recomposées ? - Alors que la Cour de Justice de l’Union Européenne est toujours saisie de litiges concernant des enfants étudiants issus de familles recomposées s’étant vu...
      4 years ago
    • Secure Belief
      VulnHub Stapler 1 Solution 2 - You can find Solution 1 here. After spending a night on this, I finally managed to solve the 2nd way to get limited shell on this box. Let's see how this ...
      4 years ago
    • Fun Over IP
      McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
      5 years ago
    • Cup of Security
      Tips That Will Help You Become An Intelligent Investor - Have you considered any investing strategies? If you don't, know you are not the only one. Lots of people have limited knowledge regarding investments. Her...
      5 years ago
    • Scrammed!
      A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
      6 years ago
    • mossmann's blog
      Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
      6 years ago
    • Java security and related topics
      USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
      6 years ago
    • The iSecLab Blog [by Faculty and Students];
      New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
      6 years ago
    • Amrit Williams Blog
      RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
      6 years ago
    • ax330d's blog
      Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
      6 years ago
    • Cognitive Dissidents
      Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
      7 years ago
    • Ma petite parcelle d'Internet...
      Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
      7 years ago
    • Androguard
      One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
      7 years ago
    • Digital Forensics is a Science
      Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
      8 years ago
    • Nynaeve
      NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
      10 years ago
    • IBM Internet Security Systems Frequency X Blog
      -
    • CryptoLUX - Recent changes [en]
      -
    • rmhrisk.wpengine.com/
      -
    • Metasploit
      -
    • woanware
      -
    • ...And You Will Know me by the Trail of Bits
      -
    Show 10 Show All

    Links

    • Schneier on Security
    • Brian Krebs on Security
    • Lenny Zeltser
    • Malware LU
    • CryptoLux
    • Unmitigated Risk
    • TaoSecurity - Bejtlich
    • root labs rdist
    • Securosis Blog
    • Trail of Bits
    • Sid's Blog [FR]
    • Fun over IP
    • Hack.lu
    • Joe Sandbox
    • SVEN

    Labels

    • Advisory (53)
    • Rants from Thierry (26)
    • Tool (19)
    • Vulnerabilties (13)
    • Misc (11)
    • Interesting Reads (10)
    • 0day (7)
    • How-to (7)
    • Luxembourg (6)
    • Whitepaper (4)
    • Constitution (2)
    • Hardware hacking (2)
    • Data Privacy (1)
     
    Copyright Musings on Information Security and Data Privacy