Wednesday, December 12, 2007

[NT] TrendMicro AntiVirus UUE Processing Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

TrendMicro AntiVirus UUE Processing Vulnerability
------------------------------------------------------------------------


SUMMARY

There is a vulnerability in TrendMicro Antivirus, which allows an attacker
to escalate to SYSTEM privilege, Denial of service, or potential execute
arbitrary code.

DETAILS

Vulnerable Systems:
* TrendMicro Antivirus prior to PccScan.dll build 1451

While decoding the .uue file., TrendMicro Antivirus will create a .zip
file, by manipulating the .uue file, we can make the TrendMicro AV
generate a .zip file which contains a long file name.

Due to the incorrect usage of wcsncpy_s() API while PccScan.dll is trying
to copy this long file name into a static buffer, the SfCtlCom.exe will
crash.

Because SfCtlCom.exe is running under SYSTEM privilege, local privilege is
possible in some cases, e.g. there is a just-in-time debugger presented.

And also, According to the vendor: "malformed UUE is not necessary, just a
malformed zip file is enough"

So this vulnerability should be called as a ".ZIP processing
vulnerability", not .UUE

The vulnerability can be exploited remotely, by sending Email or convince
the victim visit attacker controlled website. Or can be exploited locally
to gain the SYSTEM privilege.

Solution:
TrendMicro has made a patch for the vulnerability, the patch is available
from:
<http://esupport.trendmicro.com/support/viewxml.do?ContentID=1036464>

http://esupport.trendmicro.com/support/viewxml.do?ContentID=1036464

Vendor Response:
2007.11.12 - Vendor notified through several email address.
2007.11.13 - Auto-Response from the support.
2007.11.13 - Get the right person by sending emails to FD
2007.11.23 - Patch available
2007.12.05 - Patch planned on 5th, Dec
2007.12.06 - Patch delayed to 7th, Dec
2007.12.11 - Patch released by the vendor
2007.12.11 - Advisory released.


ADDITIONAL INFORMATION

The information has been provided by <mailto:smaillist@gmail.com> Sowhat.
The original article can be found at:
<http://secway.org/advisory/AD20071211.txt>

http://secway.org/advisory/AD20071211.txt

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments:

Post a Comment