You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
At Line 695 of rtfobj, there is a comparison of obj.class_name.lower() == b'package', which will incorrectly miss situations in which the class name has a trailing null, e.g. b'package\0'.
Proposal is to change comparison from above to: obj.class_name.lower().rstrip('\0') == b'package'
File/Malware sample to reproduce the bug
Malware MD5 hash is bfad291d000b56ddd8a331d7283685b2, which is posted to ANY.APP.RUN
How To Reproduce the bug
N/A
Expected behavior
Identification of the embedded package named 1.a, such that output for running rtfobj -r includes:
Affected tool:
rtfobj
Describe the bug
At Line 695 of
rtfobj
, there is a comparison ofobj.class_name.lower() == b'package'
, which will incorrectly miss situations in which the class name has a trailing null, e.g. b'package\0'.Proposal is to change comparison from above to:
obj.class_name.lower().rstrip('\0') == b'package'
File/Malware sample to reproduce the bug
Malware MD5 hash is
bfad291d000b56ddd8a331d7283685b2
, which is posted to ANY.APP.RUNHow To Reproduce the bug
N/A
Expected behavior
Identification of the embedded package named
1.a
, such that output for runningrtfobj -r
includes:Console output / Screenshots
N/A
Version information:
Additional context
N/A
The text was updated successfully, but these errors were encountered: