Jump to content

Is it possible? Help please.


Recommended Posts

MisterChazy:
 
First one must understand what a "virus" is.  Today that word is misused, abused and thrown about in a totally misperceived fashion  Viruses are a small sector of malicious software where all malicious software are deemed "malware".  There are a few subtypes of malware;  Exploits, Viruses and Trojans.  To be a "virus" the code must self replicate and spread autonomously.  If the malicious code can NOT spread autonomously then it would be in the sub-type of Trojan.  If the code is meant to "exploit" a software vulnerability then the malware falls into a sub-type of Exploit.  There is malware that possess multiple characteristics.such as an Internet Worm like the Lovsan/Blaster Worm that exploited a vulnerability in the RPC/RPCSS of the Windows OS via TCP port 135 and would inject malicious code into the vulnerable PC.  The now infected PC would then repeat that process to other computers on a network.  Thus spreading the malware autonomously.

 

That being said...  I'll address media content files which includes MP3 files..  Audio, Music and Video file formats can contain Exploit code and perform trojan activity.  One such trojan is called the "Wimad Trojan".  Wimad trojans often exploit the Windows Digital Rights Management (DRM) service.

 

So in short, media content files such as MP3 can be malicious.

 

Examples:

https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=TrojanDownloader%3AASX%2FWimad.BD

http://www.bitdefender.com/VIRUS-1000455-en--Trojan-Wimad-Gen-1.html

Link to post
Share on other sites

I kinda messed up,i meant,unless the MP3 file was designed to exploit (find a vulnerability ; a weakness in Windows Media Player that can result a malware (see David's post) to infect the system) Windows Media Player,it won't do any harm

 

Not quite. As David mentioned, an MP3 file wouldn't necessarily need to exploit a vulnerability to drop or launch malware, it all depends on how the MP3 was bound with the malicious file in question.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.