Author Topic: *ANI exploit question  (Read 3154 times)

0 Members and 1 Guest are viewing this topic.

hlecter

  • Guest
*ANI exploit question
« on: April 01, 2007, 05:24:25 PM »
AFAIK, Avast already protects against (some) of these malicious ani-files, which is good. :)

Just a question: If blocking *.ani in webshield, will Avast just look at the file extension or will it perform an actual file-inspection?

Thanks

rayi7332

  • Guest
Re: *ANI exploit question
« Reply #1 on: April 01, 2007, 06:02:28 PM »
hlecter,
The web shield will inspect the file contents as long as they are not in "excludes". Make sure you have "all files" selected in web shield custom setting. In exclusions make sure there aren't any graphics files, if so remove them. Also be sure in your resident shield custom settings to add graphics file extensions such as *.ico,*.ani,*.cur,*.jpg,*.gif, etc to be certain they are scanned. You may have noted avast! still doesn't detect many of these malicious files as of yet. I have submitted a handful of samples to ALWIL and am waiting for a virus base update. I'm sure it will be soon. Since Microshaft hasn't released a patch yet (shock) I recommend Googling "third party zero day patches". eEye Digital Research has one available, I'd get it. ZERT is currently testing theirs. I hope this helped.

Offline igor

  • Avast team
  • Serious Graphoman
  • *
  • Posts: 11850
    • AVAST Software
Re: *ANI exploit question
« Reply #2 on: April 01, 2007, 06:41:25 PM »
Blocking by WebShield only matches the [filename] mask - i.e. it doesn't inspect the real content anyhow.

hlecter

  • Guest
Re: *ANI exploit question
« Reply #3 on: April 01, 2007, 06:47:53 PM »
Blocking by WebShield only matches the [filename] mask - i.e. it doesn't inspect the real content anyhow.


Thanks Igor

rayi7332

  • Guest
Re: *ANI exploit question
« Reply #4 on: April 01, 2007, 07:10:37 PM »
Oh blocking, sorry I thought hlecter was talking about the web shield scanning. Blocking or filtering content is better performed by a firewall or IDS using signatures, and filter rules anyway. Also if *any* virus scanner goes by file mask/extension and not by inspection of at least part of the code, this would be a very weak implementation. Get patched immediately, keep your virus base updated, use a layered approach to security, and keep flossing. :)

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: *ANI exploit question
« Reply #5 on: April 01, 2007, 11:23:56 PM »
Blocking by WebShield only matches the [filename] mask - i.e. it doesn't inspect the real content anyhow.
Igor, does it speed up the Internet browsing, I mean, if you exclude a file from scanning, will it load faster?
The best things in life are free.