-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 El 2006-12-14 a las 22:56 +0100, csalinux escribió:
¡Ojo! Los virus de windows van ya casi en cualquier archivo, .doc, .xls, .jpg, .mp3, etc.
Para, para. En los .doc y .xls lo que hay son macros malignas. Son troyanos, que luego pueden derivar en virus. Lo de los jpg era un agujero que se disparaba al usar ciertos visualizadores. Lo de los mp3 no me suena. Por ejemplo: SUSE Security Summary Report Announcement ID: SUSE-SR:2006:009 Date: Fri, 28 Apr 2006 16:00:00 +0000 ... - asterisk integer overflow in JPEG handling The PBX software asterisk had insufficient length checks when processing JPG files that allowed attackers to overflow a buffer. This issue is tracked by the Mitre CVE ID CVE-2006-1827 and affects SUSE Linux 9.2, 9.3 and 10.0. Con el PNG han habido dos hace tiempo: Package: libpng Announcement-ID: SuSE-SA:2003:0004 Date: Tuesday, Jan 14th 2003 11:00 MEST Affected products: 7.1, 7.2, 7.3, 8.0, 8.1 ... 1) problem description, brief discussion, solution, upgrade information The library libpng provides several functions to encode, decode and manipulate Portable Network Graphics (PNG) image files. Due to wrong calculation of some loop offset values a buffer overflow can occur. The buffer overflow can lead to Denial-of-Service or even to remote compromise. Package: libpng Announcement-ID: SUSE-SA:2004:023 Date: Wednesday, Aug 4th 2004 16:00 MEST Affected products: 8.0, 8.1, 8.2, 9.0, 9.1 ... 1) problem description, brief discussion Several different security vulnerabilities were found in the PNG library which is used by applications to support the PNG image format. A remote attacker is able to execute arbitrary code by triggering a buffer overflow due to the incorrect handling of the length of transparency chunk data and in other pathes of image processing. (VU#388984, VU#817368, CAN-2004-0597) A special PNG image can be used to cause an application crashing due to NULL pointer dereference in the function png_handle_iCPP() (and other locations). (VU#236656, CAN-2004-0598) Integer overflows were found in png_handle_sPLT(), png_read_png() functions and other locations. These bugs may at least crash an application. (VU#160448, VU#477512, VU#286464, CAN-2004-0599) Many thanks to Chris Evans who reported issues to us and other vendors. Pero nada de eso son virus, son agujeros en ciertos programas, y sus exploits correspondientes. Por cierto, en Matrix Reloaded se cargan la central electrica con un exploit del ssh, y un ataque para cambiar la password del root, después de hacer un nmap para ver que hay al otro lado. Se ve en la pantalla ;-) - -- Saludos Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFFgeL4tTMYHG2NR9URArbkAJ9XaZDCtHUdd4nUkjwHd62ue/mlowCfVM5Q FJsvGQohKuo6cd90gd4n7d0= =pVKq -----END PGP SIGNATURE-----