The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
HAURI Anti-Virus Directory Traversal
------------------------------------------------------------------------
SUMMARY
A directory traversal vulnerability in various HAURI anti-virus products,
can be exploited by malicious people to write files to arbitrary
directories.
DETAILS
Vulnerable Systems:
* ViRobot Expert version 4.0
* ViRobot Advanced Server
* ViRobot Linux Server version 2.0
* HAURI LiveCall
The vulnerability is caused due to unsafe extraction of compressed
archives (e.g. ACE, ARJ, CAB, LZH, RAR, TAR and ZIP) into a temporary
directory before scanning. This can be exploited to write files into
arbitrary directories when scanning a malicious archive containing files
that have "/../" or "../../" directory sequences in their filenames.
Successful exploitation allows writing of files to arbitrary directories,
which can potentially lead to code execution (e.g. by overwriting certain
startup files), but requires that compressed file scanning is enabled.
Vendor Status:
The vendor has released a patch for ViRobot Linux Server 2.0:
<http://www.globalhauri.com/html/download/down_unixpatch.html>
http://www.globalhauri.com/html/download/down_unixpatch.html
The updated version of ViRobot Expert 4.0, ViRobot Advanced Server and
LiveCall are available via online update but they are still vulnerable
when scanning certain archive types.
Disclosure Timeline:
30/06/2005 - Initial vendor notification.
12/07/2005 - Second vendor notification.
14/07/2005 - Vendor response.
08/08/2005 - Received notification that VR Expert and VR Advanced Server
has been fixed via online update.
09/08/2005 - Received notification that LiveCall has been fixed via online
update.
11/08/2005 - Notified vendor that certain archive types are still
affected.
17/08/2005 - Vendor released patch for VR Linux Server and disclosed
vulnerability information.
19/08/2005 - Public disclosure.
ADDITIONAL INFORMATION
The information has been provided by <mailto:vuln@secunia.com> Secunia
Research.
The original article can be found at:
<http://secunia.com/secunia_research/2005-24/advisory/>
http://secunia.com/secunia_research/2005-24/advisory/
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
No comments:
Post a Comment