skip to main | skip to sidebar
Where facts are few, experts are many.
  • Home
  • Menu
    • About Me
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
  • Contact
    • Mail
  • Subscribe to Feed
Advisories: Apple, F-prot, Norman,Ikarus, Kaspersky
| 0 comments ]

Subscribe to the RSS feed in case you are interested in updates
  • [TZO-30-2009] Kaspersky generic PDF evasion (update: Kaspersky got in touch)
  • [TZO-31-2009] Ikarus generic evasion (ZIP,RAR,CAB)
  • [TZO-32-2009] Norman generic evasion (RAR)
  • [TZO-33-2009] F-Prot generic evasion (TAR)
  • [TZO-36-2009] Apple Safari & Quicktime Denial of Service
  • [TZO-37-2009] Apple Safari Remote code execution



0 comments

Post a Comment

Newer Post Older Post Home

About Me

My photo
Thierry Zoller
Welcome to my blog covering Information Security and Privacy.




Quick-links
▪ About me
▪ Tools / Talks / Whitepapers
▪ Vulnerability disclosure policy
▪ Subsribe to RSS Feed

View my complete profile

  • Follow me on Twitter
  • Follow me on Linked-in

  • Disclaimer: The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.

    Subscribe

    Subscribe to Musings on Information Security and Data Privacy

    Total Pageviews

    Blog Archive

    • ►  2024 (1)
      • ►  February (1)
    • ►  2023 (2)
      • ►  December (2)
    • ►  2020 (11)
      • ►  July (4)
      • ►  May (2)
      • ►  April (2)
      • ►  March (1)
      • ►  January (2)
    • ►  2017 (1)
      • ►  October (1)
    • ►  2013 (4)
      • ►  July (1)
      • ►  June (1)
      • ►  March (2)
    • ►  2012 (11)
      • ►  November (1)
      • ►  August (2)
      • ►  July (1)
      • ►  June (4)
      • ►  May (2)
      • ►  March (1)
    • ►  2011 (10)
      • ►  December (3)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
    • ►  2010 (6)
      • ►  August (1)
      • ►  July (1)
      • ►  March (2)
      • ►  February (2)
    • ▼  2009 (80)
      • ►  November (2)
      • ►  October (1)
      • ►  September (3)
      • ►  July (3)
      • ▼  June (2)
        • Advisories - FPROT,Clamav
        • Advisories: Apple, F-prot, Norman,Ikarus, Kaspersky
      • ►  May (22)
      • ►  April (16)
      • ►  March (17)
      • ►  February (7)
      • ►  January (7)
    • ►  2008 (31)
      • ►  December (2)
      • ►  November (7)
      • ►  October (7)
      • ►  September (3)
      • ►  August (12)
    • ►  2007 (7)
      • ►  October (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2006 (6)
      • ►  December (1)
      • ►  August (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2005 (9)
      • ►  October (1)
      • ►  April (7)
      • ►  January (1)
    • ►  2000 (1)
      • ►  March (1)

    Featured Post

    The importance of Psychological Safety in Cybersecurity

    I recently completed my studies at the Luxembourg School of Business and began exploring how to incorporate my newfound knowledge into my fi...

    Popular Posts

    • About me
      Born in Luxembourg, I have over 25 years of experience working in different types of information security roles,  Engineering, Governance Ri...
    • ClamAV 0.94 and below - Evasion and bypass due to malformed archive
      Generic ClamAV archive evasion Release mode: Coordinated but limited disclosure . Ref : TZO-05-2009-ClamAV Evasion Vendor ...
    • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
      Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...
    • How Germany re-introduced border controls to Luxembourg
      Introduction As many of you know the Schengen Agreement (Named after the Luxemburg City "Schengen" where the initial contract was...
    • Advisory : Firefox Denial of Service (KEYGEN)
      Comment: I have received interesting and mixed feedback from posting the above "bug". First I'd like to clarify that a vulner...

    Blogs I read

    • Didier Stevens
      Update: oledump.py Version 0.0.81 - This version brings a new plugin to extract clickable links from Word documents (.doc): plugin_hyperlink.py oledump_V0_0_81.zip (http)MD5: CEC519186C49CEA8...
      8 hours ago
    • Troy Hunt
      After the Breach: Finding new Partners with Solutions for Have I Been Pwned Users - For many years, people would come to Have I Been Pwned (HIBP), run a search on their email address, get the big red "Oh no - pwned!" response and then......
      9 hours ago
    • Krebs on Security
      Pakistani Firm Shipped Fentanyl Analogs, Scams to US - A Texas firm recently charged with conspiring to distribute synthetic opioids in the United States is at the center of a vast network of companies in the U...
      1 day ago
    • Schneier on Security
      Chinese AI Submersible - A Chinese company has developed an AI-piloted submersible that can reach speeds “similar to a destroyer or a US Navy torpedo,” dive “up to 60 metres unde...
      1 day ago
    • Adam Shostack & friends
      Andor Threats: Information Disclosure - What Andor can teach us about Information disclosure threats
      6 days ago
    • TaoSecurity
      Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7 - I just created another Windows 10/11 application using AI. This is a follow-up to the SquareCap program I posted about a few weeks ago. The problem I was...
      4 weeks ago
    • contagio
      Is he dead yet? -
      2 months ago
    • A Few Thoughts on Cryptographic Engineering
      Dear Apple: add “Disappearing Messages” to iMessage right now - This is a cryptography blog and I always feel the need to apologize for any post that isn’t “straight cryptography.” I’m actually getting a little tired of...
      2 months ago
    • Lenny Zeltser on Information Security
      The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership - As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. We increasingly recognize the importance of not just identifying r...
      2 months ago
    • CrySyS Blog
      CrySyS dataset of CAN traffic logs containing fabrication and masquerade attacks - Our paper introducing a new CAN dataset is now available in Nature: Scientific Data. The dataset contains 26 recordings of benign network traffic, amountin...
      1 year ago
    • Cup of Security
      Refrigerator Pickles - #Refrigerator #Pickles
      1 year ago
    • Uncommon Sense Security
      What a lovely sunset - Oh, hi. Long time no blog, eh? Well, it is time to sunset this blog, I will be deleting it in the next few weeks. So long, and thanks for all the fis...
      1 year ago
    • Securosis Highlights
      The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard - Posted under: What a long, strange trip it’s been over the last 3 years. In fact, the last time I saw many of you was at the last Disaster Recovery Breakf...
      2 years ago
    • VRT
      Attackers use domain fronting technique to target Myanmar with Cobalt Strike - By Chetan Raghuprasad, Vanja Svajcer and Asheer Malhotra. News Summary Cisco Talos discovered a new malicious campaign using a leaked version of Cobalt Str...
      3 years ago
    • Privacy Law Blog
      The Future of the FTC: Part II - A previous blog post discussed FTC Chairwoman Slaughter’s first priority as the newly designated chairwoman – the COVID-19 pandemic. The FTC’s second prior...
      4 years ago
    • Carnal0wnage & Attack Research Blog
      Minecraft Mod, Follow up, and Java Reflection - After yesterday's post, I received a ton of interesting and creative responses regarding how to get around the mod's restrictions which is what I love abou...
      5 years ago
    • Chatter on the Wire: How excessive network traffic gives away too much!
      Youtube channel - I've continued to make updates to the python version of satori and have put a lot of time in the past few weeks to updating fingerprints and fixing some mi...
      6 years ago
    • GreyHatHacker.NET
      Exploiting STOPzilla AntiMalware Arbitrary Write Vulnerability using SeCreateTokenPrivilege - A couple of months ago I discovered 9 kernel vulnerabilities a security product called STOPzilla AntiMalware. It’s been over a month with no response from ...
      6 years ago
    • root labs rdist
      In Which You Get a Chance to Save Democracy - Let’s start with the end: you can do something to change the broken political landscape in the United States, but you have to act quickly. Here’s a link to...
      7 years ago
    • newsoft's fun blog
      Ma contribution au mois de la cybersécurité - Dans le cadre du mois de la sécurité, l'ANSSI met en avant son MOOC : la SecNumAcadémie. Il m'a semblé opportun de vous résumer les 2h48 que j'ai passées ...
      7 years ago
    • Arne Swinnen's Security Blog - Just Another Infosec Blog
      Authentication bypass on Airbnb via OAuth tokens theft - TL;DR: Login CSRF in combination with an HTTP Referer header-based open redirect in Airbnb’s OAuth login flow, could be abused to steal OAuth access tokens...
      7 years ago
    • Security
      Introducing Qualys Project Zero? - Google's Project Zero team was announced in July 2014. Since then, it has become very well known for publishing offensive security research of exceptional ...
      7 years ago
    • Claude Adam
      No Hate Speech Movement – “Mit Energie und Konsequenz gegen Bullshit” - So mancher schiebt die Schuld für Hassnachrichten, die tagtäglich in Kommentarspalten und sozialen Netzwerken auftauchen, auf die neuen Medien: ohne Facebo...
      8 years ago
    • Secure Belief
      VulnHub Stapler 1 Solution - Well, after long time, I'm back to blogging ..!! This post is about the solution for the Stapler VM from VulnHub. The VM gets the following IP: Stapler VM...
      8 years ago
    • Fun Over IP
      McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
      9 years ago
    • LuxLegal
      La géolocalisation du salarié par l’employeur - Avec l’avènement des nouvelles technologies et leur perfectionnement, de plus en plus d’employeurs décident de recourir à la géolocalisation de leurs véh...
      9 years ago
    • Scrammed!
      A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
      10 years ago
    • mossmann's blog
      Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
      10 years ago
    • Java security and related topics
      USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
      10 years ago
    • /dev/ttyS0
      Binwalk v2.0 Released! – /dev/ttyS0 - Binwalk v2.0.0 has (finally) been released. Grab it from the github page!
      10 years ago
    • The iSecLab Blog [by Faculty and Students];
      New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
      10 years ago
    • Amrit Williams Blog
      RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
      11 years ago
    • ax330d's blog
      Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
      11 years ago
    • Cognitive Dissidents
      Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
      11 years ago
    • Ma petite parcelle d'Internet...
      Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
      11 years ago
    • Androguard
      One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
      11 years ago
    • Digital Forensics is a Science
      Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
      12 years ago
    • Nynaeve
      NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
      14 years ago
    • woanware
      -
    • rmhrisk.wpengine.com/
      -
    • Metasploit
      -
    • CryptoLUX - Recent changes [en]
      -
    • IBM Internet Security Systems Frequency X Blog
      -
    • ...And You Will Know me by the Trail of Bits
      -
    Show 10 Show All

    Links

    • Schneier on Security
    • Brian Krebs on Security
    • Lenny Zeltser
    • Malware LU
    • CryptoLux
    • Unmitigated Risk
    • TaoSecurity - Bejtlich
    • root labs rdist
    • Securosis Blog
    • Trail of Bits
    • Sid's Blog [FR]
    • Fun over IP
    • Hack.lu
    • Joe Sandbox
    • SVEN

    Labels

    • Advisory (53)
    • Rants from Thierry (25)
    • Tool (19)
    • Vulnerabilties (14)
    • Misc (10)
    • Interesting Reads (9)
    • 0day (7)
    • How-to (7)
    • Luxembourg (4)
    • Whitepaper (4)
    • Hardware hacking (2)
    • Constitution (1)
     
    Copyright Musings on Information Security and Data Privacy