McAfee AVDCDE-AA-AA User Guide - Page 289
Table 9-1. Vulnerable file name extensions, Extension, File Type, File Description
View all McAfee AVDCDE-AA-AA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 289 highlights
Default Vulnerable and Compressed File Extensions Table 9-1. Vulnerable file name extensions Extension .COM .CSC .DL? .DOC .DOT .EXE .GMS .GZ? .HLP .HT? .ICE .IM? .INI .JS? .LZH File Type Program Script/macro Program Macro Macro Program Macro Compressed Macro Script/macro Compressed Program Program Script Compressed File Description Command/binary image files. These common files run as infectable executable programs. DOS and Windows system files frequently make use of this extension. Corel script files. Script files can include viruses or generate macro viruses. Dynamic Link Library file; C++ dialog script files. Dynamic Link Library files are resource files linked to executable program files. Executable files can load viruses stored in them and run them as part of their native code. Microsoft Word document files. These files can contain Word Basic macros and, therefore, macro viruses Microsoft Word document template files. These files can contain Word Basic macros and macro viruses Executable files. Most software uses this extension to identify files that start its command shell or program kernel. Corel Global Macro Storage files. UNIX GNU Gzip compressed files. Windows Help files. These files can contain executable Word Basic or other macro code. Hyper Text Markup Language and related files; Microsoft Hyper Text template files. Although they are nominally plain text, these files can contain powerful scripting functions that act through browser software ICE compressed files. Image files for creating disk images. Windows initialization files. Although these are generally text files, infected .INI files can cause mIRC clients to perform unwanted actions. JavaScript source files. JavaScript files can contain virus code that acts directly on web browsers. LHARC compressed files User's Guide 289