The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Kaspersky Anti-Virus Engine CHM File Parser Buffer Overflow
------------------------------------------------------------------------
SUMMARY
Kaspersky Anti-Virus Engine (KAV) is "a popular virus scanning engine for
Windows and Linux. The Kaspersky Anti-Virus Engine is commonly included in
various vendors' network mail gateway and host-based antivirus products".
Remote exploitation of a buffer overflow vulnerability in Kaspersky Labs'
Anti-Virus Engine allows remote attackers to execute arbitrary code.
Kaspersky Anti-Virus Engine is used by multiple vendors in Linux virus
scanner products and exploitation requires minimal interaction by a
targeted user.
DETAILS
Vulnerable Systems:
* Kaspersky Personal version 5.0.227
* Kaspersky Anti-Virus On-Demand Scanner for Linux version 5.0.5
* F-Secure Anti-Virus for Linux version 4.50
The Kasperksy Anti-Virus Engine (KAV) is found in many gateway and
host-based anti-virus scanners. The vulnerability specifically exists in
the CHM file parser within the KAV engine. When a corrupt CHM file is
scanned by the KAV engine, a heap overflow can occur which allows remote
attackers to execute arbitrary code with permissions of the anti-virus
application's process, usually user privileges. On Microsoft platforms,
affected software has not been shown to execute arbitrary code, however
Kaspersky Anti-Virus will fail to scan any files after a corrupt CHM file
has been encountered, thus allowing further malicious codes to reach the
target.
Analysis:
Successful exploitation of the vulnerability can result in remote
arbitrary code execution or the disabling of anti-virus functionality.
In the case of Linux platforms, specifically network gateways, user
interaction is not required and can lead to the compromise of trusted
systems. In addition, compromising mail gateways can lead to further
compromise of internal hosts by injecting malicious code into mail
attachments.
Vendor response:
The vendor has notified iDEFENSE that the vulnerability has been addressed
via a signature update. Users who have updated their signatures after July
2005 are reportedly not affected. Update your anti-virus signatures to
ensure the vulnerability has been addressed.
CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2937>
CAN-2005-2937
Disclosure Timeline:
06/20/2005 - Initial vendor notification
10/05/2005 - Initial vendor response
10/10/2005 - Public disclosure
ADDITIONAL INFORMATION
The information has been provided by
<mailto:idlabs-advisories@lists.idefense.com> iDEFENSE Labs Security
Advisories.
The original article can be found at:
<http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities> http://www.idefense.com/application/poi/display?id=318&type=vulnerabilities
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
No comments:
Post a Comment