The Artima Developer Community
Sponsored Link

.NET Buzz Forum
Bloodhound Exploit 84?

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Sascha Corti

Posts: 797
Nickname: sascha
Registered: Aug, 2003

Sascha Corti is a developer evangelist for Microsoft in Switzerland.
Bloodhound Exploit 84? Posted: Oct 12, 2006 6:17 AM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by Sascha Corti.
Original Post: Bloodhound Exploit 84?
Feed Title: Console.WriteLine("Hello World");
Feed URL: http://www.corti.com/WebLogSascha/blogxbrowsing.asmx/GetRss?
Feed Description: A technology blog with a focus on the .NET framework, the Visual Studio .NET tools and the Windows server platform with of course the normal weblog-noise on what's happening in the industry and reviews of the latest geeky gadgets.
Latest .NET Buzz Posts
Latest .NET Buzz Posts by Sascha Corti
Latest Posts From Console.WriteLine("Hello World");

Advertisement
A visitor reports that the TechTalk slides posted by me yesterday show up in the heuristic scan engine of Symantec Antivirus 9.0 Corporate Edition (with signature files from October 11) as infected with the "Bloodhound.Exploit.84". My eTrust antivirus software can't verify this and I already have reports that today's virus signatures do not report these files as infected anymore.
Trojan horse
(
Wikipedia)
Symantec's description: Bloodhound.Exploit.84 is a heuristic detection for Microsoft Office Malformed Record Memory Corruption Vulnerability (as described in Microsoft Security Bulletin MS06-62). An attacker who exploits this vulnerability could perform a denial of service attack against a vulnerable version of PowerPoint, or potentially execute arbitrary code with the privileges of the logged-on user. The exploit is triggered by viewing a specially-crafted PPT file.

For safety reasons I have however pulled all the slides from CodeZone and replaced them with Zip-Archives containing only PDF versions of my decks.

Thanks for all the reports! I will keep investigating...

Read: Bloodhound Exploit 84?

Topic: Window Capture Previous Topic   Next Topic Topic: Processes and Practices

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use