VARIoT IoT vulnerabilities database
| VAR-201203-0385 | CVE-2012-1425 | Multiple products TAR Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \50\4B\03\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party \50\4B\03\04 Has a character sequence starting with POSIX TAR Malware detection may be avoided via files.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection.
The following products are affected:
AVIRA AntiVir Engine 7.11.1.163
Antiy Antiy-AVL 2.0.3.7
Quick Heal Technologies CAT-QuickHeal 11.00
Emsisoft Antivirus 5.1.0.1
Ikarus Antivirus T3.1.1.97.0
Jiangmin 13.0.900
Kaspersky Antivirus 7.0.0.125
McAfee 5.400.0.1158
McAfee-GW-Edition 2010.1C
NOD32 5795
Norman Antivirus 6.06.12
PCTools Antivirus 7.0.3.5
Symantec AntiVirus 20101.3.0.103
TrendMicro 9.120.0.1004
TrendMicro-HouseCall 9.120.0.1004. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03
CVE no -
CVE-2012-1420
3. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection.
Affected products -
BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01,
Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1430
13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0,
Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1442
25. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125,
Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,
Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,
Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1453
36. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C,
Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1454
37. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection.
Affected products -
AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,
eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1456
39. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7,
Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2,
CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424,
Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795,
Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7,
PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0,
Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2,
VirusBuster 13.6.151.0
CVE no -
CVE-2012-1459
42. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0390 | CVE-2012-1430 | Multiple products ELF Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.A specific position by a third party \19\04\00\10 With the character sequence ELF Malware detection may be avoided via files. Multiple Antivirus products are prone prone to a vulnerability that may allow an attacker to bypass on-demand scans.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03
CVE no -
CVE-2012-1420
3. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0391 | CVE-2012-1431 | Multiple products ELF Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.A specific position by a third party \4a\46\49\46 With the character sequence ELF Malware detection may be avoided via files.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03
CVE no -
CVE-2012-1420
3. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,
Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1425
8. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0,
Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1442
25. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103,
Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125,
McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511,
Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1446
29. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125,
Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,
Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,
Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1453
36. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C,
Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1454
37. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0367 | CVE-2012-1443 | Multiple products RAR Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03
CVE no -
CVE-2012-1420
3. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,
Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1425
8. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection.
Affected products -
BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01,
Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1430
13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0,
Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1442
25. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103,
Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125,
McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511,
Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1446
29. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125,
Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,
Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,
Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1453
36. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C,
Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1454
37. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection.
Affected products -
AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,
eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1456
39. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0399 | CVE-2012-1439 | Multiple products ELF Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ELF file parser in eSafe 7.0.17.0, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified padding field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection.
The following products are affected:
eSafe Antivirus 7.0.17.0
Rising Antivirus 22.83.00.03
Panda Antivirus 10.0.2.7. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,
Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1425
8. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7,
Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2,
CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424,
Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795,
Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7,
PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0,
Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2,
VirusBuster 13.6.151.0
CVE no -
CVE-2012-1459
42. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0400 | CVE-2012-1440 | Multiple products ELF Vulnerability to bypass malware detection in file parser |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ELF file parser in Norman Antivirus 6.06.12, eSafe 7.0.17.0, CA eTrust Vet Antivirus 36.1.8511, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified identsize field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. CVE May be split intoChanged by a third party identsize Have fields ELF Via files, malware detection can be bypassed.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12.
Affected products -
BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01,
Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1430
13.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0,
Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1442
25. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125,
Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,
Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,
Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1453
36. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C,
Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1454
37. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7,
Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2,
CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424,
Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795,
Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7,
PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0,
Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2,
VirusBuster 13.6.151.0
CVE no -
CVE-2012-1459
42. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0383 | CVE-2012-1423 | Multiple products TAR Vulnerability to bypass malware detection in file parser |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR The file parser contains a vulnerability that can bypass malware detection. CVE May be split intoBy a third party, MZ Has a character sequence that starts with POSIX TAR Via files, malware detection can be bypassed.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0368 | CVE-2012-1444 | Multiple products ELF Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ELF file parser in eSafe 7.0.17.0, Prevx 3.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified abiversion field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection.
The following products are affected:
Fortinent Fortinent Antivirus 4.2.254.0
Prevx Prevx 3.0
eSafe Antivirus 7.0.017 0
Panda Antivirus 10.0.2.7. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection.
Affected products -
BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01,
Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1430
13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection.
Affected products -
AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,
eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1456
39. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7,
Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2,
CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424,
Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795,
Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7,
PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0,
Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2,
VirusBuster 13.6.151.0
CVE no -
CVE-2012-1459
42. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0369 | CVE-2012-1445 | Multiple products ELF Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ELF file parser in eSafe 7.0.17.0, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified abi field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection.
The following products are affected:
Fortinent Fortinent Antivirus 4.2.254.0
Rising Antivirus 22.83.00.03
eSafe Antivirus 7.0.017 0
Panda Antivirus 10.0.2.7. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,
Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1425
8. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AhnLab-V3 2011.01.18.00, AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7,
Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2,
CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Comodo 7424,
Emsisoft 5.1.0.1, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
Fortinent 4.2.254.0, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795,
Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7,
PCTools 7.0.3.5, Rising 22.83.00.03, Sophos 4.61.0,
Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2,
VirusBuster 13.6.151.0
CVE no -
CVE-2012-1459
42. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0364 | CVE-2012-1420 | Multiple products TAR Vulnerability that prevents file parsers from detecting malware |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party \7fELF ( backslash 7fELF) Has a character sequence starting with POSIX TAR Malware detection may be avoided via files.
Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All
affected products are command-line versions of
the AVs.
----------------------------
Vulnerability Descriptions
----------------------------
1. Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes
evades detection.
Affected products -
ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1419
2. Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03
CVE no -
CVE-2012-1420
3. Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1421
4. Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes
evades detection.
Affected products -
CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1422
5. Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes
evades detection.
Affected products -
Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0,
Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12,
PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1423
6. Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8
evades detection.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12,
PCTools 7.0.3.5, Sophos 4.61.0
CVE no -
CVE-2012-1424
7. Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first
4 bytes evades detection.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,
Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1425
8. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first
3 bytes evades detection.
Affected products -
CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117,
K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no -
CVE-2012-1426
9. Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at
offset 29 evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1427
10. Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6
evades detection.
Affected products -
CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no -
CVE-2012-1428
11. Specially crafted infected ELF files with "ustar" at offset 257
evades detection.
Affected products -
BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no -
CVE-2012-1429
12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades
detection.
Affected products -
BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01,
Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1430
13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades
detection.
Affected products -
BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0,
F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C,
nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no -
CVE-2012-1431
14. Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset
29 evades detection.
Affected products -
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1432
15. Specially crafted infected MS EXE files with "\4a\46\49\46" at offset
6 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1433
16. Specially crafted infected MS EXE files with "\19\04\00\10" at offset
8 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1434
17. Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at
offset 30 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1435
18. Specially crafted infected MS EXE files with "\2D\6C\68" at
offset 2 evades detection.
Affected products -
AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0,
Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no -
CVE-2012-1436
19. Specially crafted infected MS Office files with "\50\4B\53\70\58" at
offset 526 evades detection.
Affected products -
Comodo 7425
CVE no -
CVE-2012-1437
20. Specially crafted infected MS Office files with "ustar" at
offset 257 evades detection.
Affected products -
Comodo 7425, Sophos 4.61.0
CVE no -
CVE-2012-1438
21. 'padding' field in ELF files is parsed incorrectly.
If an infected ELF file's padding field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1439
22. 'identsize' field in ELF files is parsed incorrectly.
If an infected ELF file's identsize field is incremented by 1 it evades
detection.
Affected products -
Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1440
23. 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0
CVE no -
CVE-2012-1441
24. 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0,
Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1442
25. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the
user and correctly extracted. Such a file evades detection.
Affected products -
ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21,
Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0,
Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117,
VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7,
K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125
Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163,
Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C,
TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0
nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0,
Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no -
CVE-2012-1443
26. 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1444
27. 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades
detection.
Affected products -
eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1445
28. 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103,
Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125,
McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511,
Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,
Panda 10.0.2.7
CVE no -
CVE-2012-1446
29. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades
detection.
Affected products -
Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no -
CVE-2012-1447
30. 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades
detection.
Affected products -
CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0
TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no -
CVE-2012-1448
31. 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1449
32. 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1450
33. 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no -
CVE-2012-1451
34. 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades
detection.
Affected products -
Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no -
CVE-2012-1452
35. 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125,
Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,
Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,
Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1453
36. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades
detection.
Affected products -
McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C,
Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no -
CVE-2012-1454
37. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades
detection.
Affected products -
NOD32 5795, Rising 22.83.00.03
CVE no -
CVE-2012-1455
38. A specially crafted ZIP file, created by concatenating the contents
of a clean TAR archive and a virus-infected ZIP archive, is parsed
incorrectly and evades detection.
Affected products -
AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,
eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158,
McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no -
CVE-2012-1456
39. If the length field in the header of a file with test EICAR virus
included into a TAR archive is set to be greater than the archive's total
length (1,000,000+original length in our experiments), the antivirus
declares the file to be clean but virus gets extracted correctly by the
GNU tar program.
Affected products -
AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0,
AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4,
Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,
GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565,
Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C,
Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5,
Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004,
TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no -
CVE-2012-1457
40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,
scripts, and images compressed using the LZX algorithm.
For faster random accesses, the algorithm is reset at intervals
instead of compressing the entire file as a single stream. The
length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval
is lower than in the original file, the antivirus declares the file
to be clean. But the Windows CHM viewer hh.exe correctly decompresses
the infected content located before the tampered header.
Affected products -
ClamAV 0.96.4, Sophos 4.61.0
CVE no -
CVE-2012-1458
41. In a POSIX TAR archive, each member file has a 512-byte header protected
by a simple checksum. Every header also contains a file length field, which
is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while
the second is infected with test EICAR virus - and it is modified such that
the length field in the header of the first, clean file to point into the
middle of the header of the second, infected file. The antivirus declares
the file to be clean but virus gets extracted correctly by the
GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end,
the antivirus declares the file to be clean but virus gets extracted by
the gunzip+tar programs correctly by ignoring these bytes.
Affected products -
Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5,
eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900,
K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no -
CVE-2012-1460
43. GZIP files can contain multiple compressed streams, which are assembled
when the contents are extracted. If an infected .tar.gz file is broken
into two streams, the antivirus declares the infected .tar.gz file to
be clean while tar+gunzip extract the virus correctly
Affected products -
AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1,
F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125,
McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12,
Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103,
TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no -
CVE-2012-1461
44. If an infected ZIP archive is prepended with 1024 random bytes at the
beginning, the antivirus declares the file to be clean but virus gets extracted
by the unzip program correctly by skipping these bytes
Affected products -
AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00,
Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0,
Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0,
Symantec 20101.3.0.103
CVE no -
CVE-2012-1462
45. In most ELF files, the 5th byte of the header indicates endianness: 01
for little-endian, 02 for bigendian. Linux kernel, however, does not
check this field before loading an ELF file. If an infected ELF file's 5-th
byte is set to 02, the antivirus declares the file to be clean but the ELF
file gets executed correctly.
Affected products -
AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5,
Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0,
McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no -
CVE-2012-1463
--------
Credits
--------
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
-----------
References
-----------
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov
To appear in IEEE Symposium on Security and Privacy 2012
http://www.ieee-security.org/TC/SP2012/
| VAR-201203-0519 | No CVE | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: High |
JP1/Cm2/Network Node Manager i (NNMi) contains vulnerabilities could allow a remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. A remote attacker could cause a denial of service (DoS) condition or execute arbitrary code.
| VAR-201203-0249 | CVE-2012-1844 | Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100) and the IBM TS3310 tape library with firmware before R6C (606G.GS001), uses default passwords for unspecified user accounts, which makes it easier for remote attackers to obtain access via unknown vectors. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. The Quantum Scalar i500 and Dell ML6000 tape libraries contain the following WEB interface vulnerabilities: (1) The WEB interface allows unauthenticated remote users to view any file on the WEB server, such as http://device/logShow.htm?file=/etc/shadow . (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability
2. A cross-site request-forgery vulnerability
4. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks.
Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Quantum Scalar i500 Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA48403
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48403/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
RELEASE DATE:
2012-03-20
DISCUSS ADVISORY:
http://secunia.com/advisories/48403/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48403/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Quantum Scalar i500,
which can be exploited by malicious people to disclose potentially
sensitive information and conduct cross-site scripting and request
forgery attacks.
1) Input passed via e.g. the "file" parameter to logShow.html is not
properly verified before being used to display files. This can be
exploited to disclose the contents of arbitrary files via directory
traversal sequences.
2) Certain input passed via checkQKMProg.htm is not properly
sanitised before being returned to the user. This can be exploited to e.g.
SOLUTION:
Update to firmware version i7.0.3 (604G.GS00100) or later.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits NOAA CIRT.
ORIGINAL ADVISORY:
US-CERT:
http://www.kb.cert.org/vuls/id/913483
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201203-0257 | CVE-2012-1841 | Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Absolute path traversal vulnerability in logShow.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to read arbitrary files via a full pathname in the file parameter. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability
2. A cross-site request-forgery vulnerability
4. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks.
Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Quantum Scalar i500 Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA48403
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48403/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
RELEASE DATE:
2012-03-20
DISCUSS ADVISORY:
http://secunia.com/advisories/48403/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48403/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Quantum Scalar i500,
which can be exploited by malicious people to disclose potentially
sensitive information and conduct cross-site scripting and request
forgery attacks.
1) Input passed via e.g. the "file" parameter to logShow.html is not
properly verified before being used to display files. This can be
exploited to disclose the contents of arbitrary files via directory
traversal sequences.
2) Certain input passed via checkQKMProg.htm is not properly
sanitised before being returned to the user. This can be exploited to e.g.
SOLUTION:
Update to firmware version i7.0.3 (604G.GS00100) or later.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits NOAA CIRT.
ORIGINAL ADVISORY:
US-CERT:
http://www.kb.cert.org/vuls/id/913483
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201203-0248 | CVE-2012-1843 | Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities |
CVSS V2: 6.0 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in saveRestore.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to hijack the authentication of users for requests that execute Linux commands via the fileName parameter, related to a "command-injection vulnerability.". Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability
2. A cross-site request-forgery vulnerability
4. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks.
Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Quantum Scalar i500 Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA48403
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48403/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
RELEASE DATE:
2012-03-20
DISCUSS ADVISORY:
http://secunia.com/advisories/48403/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48403/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Quantum Scalar i500,
which can be exploited by malicious people to disclose potentially
sensitive information and conduct cross-site scripting and request
forgery attacks.
1) Input passed via e.g. the "file" parameter to logShow.html is not
properly verified before being used to display files. This can be
exploited to disclose the contents of arbitrary files via directory
traversal sequences.
2) Certain input passed via checkQKMProg.htm is not properly
sanitised before being returned to the user. This can be exploited to e.g.
SOLUTION:
Update to firmware version i7.0.3 (604G.GS00100) or later.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits NOAA CIRT.
ORIGINAL ADVISORY:
US-CERT:
http://www.kb.cert.org/vuls/id/913483
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201203-0247 | CVE-2012-1842 | Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
Cross-site scripting (XSS) vulnerability in checkQKMProg.htm on the Quantum Scalar i500 tape library with firmware before i7.0.3 (604G.GS00100), also distributed as the Dell ML6000 tape library with firmware before A20-00 (590G.GS00100), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. (2) http://device/checkQKMProg.htm There is a cross-site scripting vulnerability that allows you to get the session ID. (3) The POST parameter executes any command with the ROOT user. An information-disclosure vulnerability
2. A cross-site request-forgery vulnerability
4. A security-bypass vulnerability
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that may aid in launching further attacks.
Exploiting the cross-site request-forgery may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
Attackers can exploit a password weakness issue to bypass security restrictions to obtain sensitive information or perform unauthorized actions; this may aid in launching further attacks. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Quantum Scalar i500 Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA48403
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48403/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
RELEASE DATE:
2012-03-20
DISCUSS ADVISORY:
http://secunia.com/advisories/48403/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48403/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48403
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Quantum Scalar i500,
which can be exploited by malicious people to disclose potentially
sensitive information and conduct cross-site scripting and request
forgery attacks.
1) Input passed via e.g. the "file" parameter to logShow.html is not
properly verified before being used to display files. This can be
exploited to disclose the contents of arbitrary files via directory
traversal sequences.
2) Certain input passed via checkQKMProg.htm is not properly
sanitised before being returned to the user. This can be exploited to e.g.
SOLUTION:
Update to firmware version i7.0.3 (604G.GS00100) or later.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits NOAA CIRT.
ORIGINAL ADVISORY:
US-CERT:
http://www.kb.cert.org/vuls/id/913483
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201204-0160 | CVE-2012-0250 | Quagga contains multiple vulnerabilities |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field. Quagga, a routing software suite, contains multiple vulnerabilities that result in a denial-of-service condition. Quagga is prone to multiple remote security vulnerabilities including:
1. A denial-of-service vulnerability
2. Multiple buffer-overflow vulnerabilities
An attackers can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions.
Quagga versions prior to 0.99.20.1 are vulnerable. ============================================================================
Ubuntu Security Notice USN-1441-1
May 15, 2012
quagga vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
Summary:
Quagga could be made to crash if it received specially crafted network
traffic. (CVE-2012-0249,
CVE-2012-0250)
It was discovered that Quagga incorrectly handled messages with a malformed
Four-octet AS Number Capability. After a standard system update you need to restart Quagga to make
all the necessary changes. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Debian update for quagga
SECUNIA ADVISORY ID:
SA48949
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48949/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48949
RELEASE DATE:
2012-04-26
DISCUSS ADVISORY:
http://secunia.com/advisories/48949/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48949/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48949
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Debian has issued an update for quagga. This fixes multiple
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service).
For more information:
SA48388
SOLUTION:
Apply updated packages via the apt-get package manager.
ORIGINAL ADVISORY:
DSA-2459-1:
http://lists.debian.org/debian-security-announce/2012/msg00092.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201310-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Quagga: Multiple vulnerabilities
Date: October 10, 2013
Bugs: #408507, #475706
ID: 201310-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Quagga, the worst of which
could lead to arbitrary code execution. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Quagga users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/quagga-0.99.22.4"
References
==========
[ 1 ] CVE-2012-0249
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0249
[ 2 ] CVE-2012-0250
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0250
[ 3 ] CVE-2012-0255
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0255
[ 4 ] CVE-2012-1820
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1820
[ 5 ] CVE-2013-2236
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2236
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201310-08.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: quagga security update
Advisory ID: RHSA-2012:1259-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1259.html
Issue date: 2012-09-12
CVE Names: CVE-2011-3323 CVE-2011-3324 CVE-2011-3325
CVE-2011-3326 CVE-2011-3327 CVE-2012-0249
CVE-2012-0250 CVE-2012-0255 CVE-2012-1820
=====================================================================
1. Summary:
Updated quagga packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. The Quagga bgpd daemon
implements the BGP (Border Gateway Protocol) routing protocol. The Quagga
ospfd and ospf6d daemons implement the OSPF (Open Shortest Path First)
routing protocol.
A heap-based buffer overflow flaw was found in the way the bgpd daemon
processed malformed Extended Communities path attributes. An attacker could
send a specially-crafted BGP message, causing bgpd on a target system to
crash or, possibly, execute arbitrary code with the privileges of the user
running bgpd. The UPDATE message would have to arrive from an explicitly
configured BGP peer, but could have originated elsewhere in the BGP
network. (CVE-2011-3327)
A stack-based buffer overflow flaw was found in the way the ospf6d daemon
processed malformed Link State Update packets. An OSPF router could use
this flaw to crash ospf6d on an adjacent router. (CVE-2011-3323)
A flaw was found in the way the ospf6d daemon processed malformed link
state advertisements. An OSPF neighbor could use this flaw to crash
ospf6d on a target system. (CVE-2011-3324)
A flaw was found in the way the ospfd daemon processed malformed Hello
packets. An OSPF neighbor could use this flaw to crash ospfd on a
target system. (CVE-2011-3325)
A flaw was found in the way the ospfd daemon processed malformed link state
advertisements. An OSPF router in the autonomous system could use this flaw
to crash ospfd on a target system. (CVE-2011-3326)
An assertion failure was found in the way the ospfd daemon processed
certain Link State Update packets. An OSPF router could use this flaw to
cause ospfd on an adjacent router to abort. (CVE-2012-0249)
A buffer overflow flaw was found in the way the ospfd daemon processed
certain Link State Update packets. An OSPF router could use this flaw to
crash ospfd on an adjacent router. (CVE-2012-0250)
Two flaws were found in the way the bgpd daemon processed certain BGP OPEN
messages. A configured BGP peer could cause bgpd on a target system to
abort via a specially-crafted BGP OPEN message. (CVE-2012-0255,
CVE-2012-1820)
Red Hat would like to thank CERT-FI for reporting CVE-2011-3327,
CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and CVE-2011-3326; and the
CERT/CC for reporting CVE-2012-0249, CVE-2012-0250, CVE-2012-0255, and
CVE-2012-1820. CERT-FI acknowledges Riku Hietamäki, Tuomo Untinen and Jukka
Taimisto of the Codenomicon CROSS project as the original reporters of
CVE-2011-3327, CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and
CVE-2011-3326. The CERT/CC acknowledges Martin Winter at
OpenSourceRouting.org as the original reporter of CVE-2012-0249,
CVE-2012-0250, and CVE-2012-0255, and Denis Ovsienko as the original
reporter of CVE-2012-1820.
Users of quagga should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, the bgpd, ospfd, and ospf6d daemons will be restarted
automatically.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
5. Package List:
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm
i386:
quagga-0.99.15-7.el6_3.2.i686.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm
ppc64:
quagga-0.99.15-7.el6_3.2.ppc64.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.ppc64.rpm
s390x:
quagga-0.99.15-7.el6_3.2.s390x.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.s390x.rpm
x86_64:
quagga-0.99.15-7.el6_3.2.x86_64.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm
i386:
quagga-contrib-0.99.15-7.el6_3.2.i686.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm
quagga-devel-0.99.15-7.el6_3.2.i686.rpm
ppc64:
quagga-contrib-0.99.15-7.el6_3.2.ppc64.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.ppc.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.ppc64.rpm
quagga-devel-0.99.15-7.el6_3.2.ppc.rpm
quagga-devel-0.99.15-7.el6_3.2.ppc64.rpm
s390x:
quagga-contrib-0.99.15-7.el6_3.2.s390x.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.s390.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.s390x.rpm
quagga-devel-0.99.15-7.el6_3.2.s390.rpm
quagga-devel-0.99.15-7.el6_3.2.s390x.rpm
x86_64:
quagga-contrib-0.99.15-7.el6_3.2.x86_64.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm
quagga-devel-0.99.15-7.el6_3.2.i686.rpm
quagga-devel-0.99.15-7.el6_3.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm
i386:
quagga-0.99.15-7.el6_3.2.i686.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm
x86_64:
quagga-0.99.15-7.el6_3.2.x86_64.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm
i386:
quagga-contrib-0.99.15-7.el6_3.2.i686.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm
quagga-devel-0.99.15-7.el6_3.2.i686.rpm
x86_64:
quagga-contrib-0.99.15-7.el6_3.2.x86_64.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm
quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm
quagga-devel-0.99.15-7.el6_3.2.i686.rpm
quagga-devel-0.99.15-7.el6_3.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-3323.html
https://www.redhat.com/security/data/cve/CVE-2011-3324.html
https://www.redhat.com/security/data/cve/CVE-2011-3325.html
https://www.redhat.com/security/data/cve/CVE-2011-3326.html
https://www.redhat.com/security/data/cve/CVE-2011-3327.html
https://www.redhat.com/security/data/cve/CVE-2012-0249.html
https://www.redhat.com/security/data/cve/CVE-2012-0250.html
https://www.redhat.com/security/data/cve/CVE-2012-0255.html
https://www.redhat.com/security/data/cve/CVE-2012-1820.html
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFQUOxMXlSAg2UNWIIRAspnAKDCd5umtQIWFZYD8vyRPpCkAlgiwwCglw+g
P4VSjxs4xRnVCtT/IOkBkKQ=
=VtuC
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce.
This security update upgrades the quagga package to the most recent
upstream release. This release includes other corrections, such as
hardening against unknown BGP path attributes.
For the stable distribution (squeeze), these problems have been fixed
in version 0.99.20.1-0+squeeze1.
For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 0.99.20.1-1
| VAR-201205-0297 | CVE-2012-1179 | Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries web interface and preconfigured password vulnerabilities |
CVSS V2: 5.2 CVSS V3: - Severity: MEDIUM |
The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial of service (host OS crash) by leveraging administrative access to the guest OS, related to the pmd_none_or_clear_bad function and page faults for huge pages. Cross scripting and preconfigured password vulnerabilities have been reported to exist in the Quantum Scalar i500, Dell ML6000 and IBM TS3310 tape libraries. The Linux kernel is prone to a local denial-of-service vulnerability.
Attackers can exploit this issue to cause the kernel to crash, denying service to legitimate users.
Linux Kernel 2.6.x is vulnerable. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2012:0743-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0743.html
Issue date: 2012-06-18
CVE Names: CVE-2012-0044 CVE-2012-1179 CVE-2012-2119
CVE-2012-2121 CVE-2012-2123 CVE-2012-2136
CVE-2012-2137 CVE-2012-2372 CVE-2012-2373
=====================================================================
1. Summary:
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3.
This update fixes the following security issues:
* A local, unprivileged user could use an integer overflow flaw in
drm_mode_dirtyfb_ioctl() to cause a denial of service or escalate their
privileges. (CVE-2012-0044, Important)
* A buffer overflow flaw was found in the macvtap device driver, used for
creating a bridged network between the guest and the host in KVM
(Kernel-based Virtual Machine) environments. A privileged guest user in a
KVM guest could use this flaw to crash the host. Note: This issue only
affected hosts that have the vhost_net module loaded with the
experimental_zcopytx module option enabled (it is not enabled by default),
and that also have macvtap configured for at least one guest.
(CVE-2012-2119, Important)
* When a set user ID (setuid) application is executed, certain personality
flags for controlling the application's behavior are cleared (that is, a
privileged application will not be affected by those flags). It was found
that those flags were not cleared if the application was made privileged
via file system capabilities. A local, unprivileged user could use this
flaw to change the behavior of such applications, allowing them to bypass
intended restrictions. Note that for default installations, no application
shipped by Red Hat for Red Hat Enterprise Linux is made privileged via file
system capabilities. (CVE-2012-2123, Important)
* It was found that the data_len parameter of the sock_alloc_send_pskb()
function in the Linux kernel's networking implementation was not validated
before use. A privileged guest user in a KVM guest could use this flaw to
crash the host or, possibly, escalate their privileges on the host.
(CVE-2012-2136, Important)
* A buffer overflow flaw was found in the setup_routing_entry() function in
the KVM subsystem of the Linux kernel in the way the Message Signaled
Interrupts (MSI) routing entry was handled. A local, unprivileged user
could use this flaw to cause a denial of service or, possibly, escalate
their privileges. (CVE-2012-2137, Important)
* A race condition was found in the Linux kernel's memory management
subsystem in the way pmd_none_or_clear_bad(), when called with mmap_sem in
read mode, and Transparent Huge Pages (THP) page faults interacted. A
privileged user in a KVM guest with the ballooning functionality enabled
could potentially use this flaw to crash the host. A local, unprivileged
user could use this flaw to crash the system. (CVE-2012-1179, Moderate)
* A flaw was found in the way device memory was handled during guest device
removal. Upon successful device removal, memory used by the device was not
properly unmapped from the corresponding IOMMU or properly released from
the kernel, leading to a memory leak. A malicious user on a KVM host who
has the ability to assign a device to a guest could use this flaw to crash
the host. (CVE-2012-2121, Moderate)
* A flaw was found in the Linux kernel's Reliable Datagram Sockets (RDS)
protocol implementation. A local, unprivileged user could use this flaw to
cause a denial of service. (CVE-2012-2372, Moderate)
* A race condition was found in the Linux kernel's memory management
subsystem in the way pmd_populate() and pte_offset_map_lock() interacted on
32-bit x86 systems with more than 4GB of RAM. A local, unprivileged user
could use this flaw to cause a denial of service. (CVE-2012-2373, Moderate)
Red Hat would like to thank Chen Haogang for reporting CVE-2012-0044.
This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.
5. Bugs fixed (http://bugzilla.redhat.com/):
772894 - CVE-2012-0044 kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()
803793 - CVE-2012-1179 kernel: thp:__split_huge_page() mapcount != page_mapcount BUG_ON()
806722 - CVE-2012-2123 kernel: fcaps: clear the same personality flags as suid when fcaps are used
814149 - CVE-2012-2121 kvm: device assignment page leak
814278 - CVE-2012-2119 kernel: macvtap: zerocopy: vector length is not validated before pinning user pages
814657 - kernel crash at ieee80211_mgd_probe_ap_send [rhel-6.2.z]
816151 - CVE-2012-2137 kernel: kvm: buffer overflow in kvm_set_irq()
816226 - add option to disable 5GHz band to iwlwifi [rhel-6.2.z]
816289 - CVE-2012-2136 kernel: net: insufficient data_len validation in sock_alloc_send_pskb()
818504 - Disable LRO for all NICs that have LRO enabled [rhel-6.2.z]
818505 - xen: fix drive naming [rhel-6.2.z]
819614 - 2.6.32-220 kernel does not work on a HP DL385G6 with HP Smart Array P410 controller and hpsa driver [rhel-6.2.z]
822754 - CVE-2012-2372 kernel: rds-ping cause kernel panic
822821 - CVE-2012-2373 kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
i386:
kernel-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-220.23.1.el6.i686.rpm
kernel-devel-2.6.32-220.23.1.el6.i686.rpm
kernel-headers-2.6.32-220.23.1.el6.i686.rpm
perf-2.6.32-220.23.1.el6.i686.rpm
perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
noarch:
kernel-doc-2.6.32-220.23.1.el6.noarch.rpm
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm
x86_64:
kernel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
kernel-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-headers-2.6.32-220.23.1.el6.x86_64.rpm
perf-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
i386:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-220.23.1.el6.i686.rpm
perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
python-perf-2.6.32-220.23.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
noarch:
kernel-doc-2.6.32-220.23.1.el6.noarch.rpm
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm
x86_64:
kernel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
kernel-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-headers-2.6.32-220.23.1.el6.x86_64.rpm
perf-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
i386:
kernel-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-220.23.1.el6.i686.rpm
kernel-devel-2.6.32-220.23.1.el6.i686.rpm
kernel-headers-2.6.32-220.23.1.el6.i686.rpm
perf-2.6.32-220.23.1.el6.i686.rpm
perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
noarch:
kernel-doc-2.6.32-220.23.1.el6.noarch.rpm
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm
ppc64:
kernel-2.6.32-220.23.1.el6.ppc64.rpm
kernel-bootwrapper-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debug-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-220.23.1.el6.ppc64.rpm
kernel-devel-2.6.32-220.23.1.el6.ppc64.rpm
kernel-headers-2.6.32-220.23.1.el6.ppc64.rpm
perf-2.6.32-220.23.1.el6.ppc64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
s390x:
kernel-2.6.32-220.23.1.el6.s390x.rpm
kernel-debug-2.6.32-220.23.1.el6.s390x.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-220.23.1.el6.s390x.rpm
kernel-devel-2.6.32-220.23.1.el6.s390x.rpm
kernel-headers-2.6.32-220.23.1.el6.s390x.rpm
kernel-kdump-2.6.32-220.23.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
kernel-kdump-devel-2.6.32-220.23.1.el6.s390x.rpm
perf-2.6.32-220.23.1.el6.s390x.rpm
perf-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
x86_64:
kernel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
kernel-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-headers-2.6.32-220.23.1.el6.x86_64.rpm
perf-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
i386:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-220.23.1.el6.i686.rpm
perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
python-perf-2.6.32-220.23.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
ppc64:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-220.23.1.el6.ppc64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
python-perf-2.6.32-220.23.1.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.ppc64.rpm
s390x:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-220.23.1.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
perf-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
python-perf-2.6.32-220.23.1.el6.s390x.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.s390x.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
i386:
kernel-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-220.23.1.el6.i686.rpm
kernel-devel-2.6.32-220.23.1.el6.i686.rpm
kernel-headers-2.6.32-220.23.1.el6.i686.rpm
perf-2.6.32-220.23.1.el6.i686.rpm
perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
noarch:
kernel-doc-2.6.32-220.23.1.el6.noarch.rpm
kernel-firmware-2.6.32-220.23.1.el6.noarch.rpm
x86_64:
kernel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
kernel-devel-2.6.32-220.23.1.el6.x86_64.rpm
kernel-headers-2.6.32-220.23.1.el6.x86_64.rpm
perf-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-220.23.1.el6.src.rpm
i386:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-220.23.1.el6.i686.rpm
perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
python-perf-2.6.32-220.23.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.i686.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-220.23.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-2.6.32-220.23.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-220.23.1.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2012-0044.html
https://www.redhat.com/security/data/cve/CVE-2012-1179.html
https://www.redhat.com/security/data/cve/CVE-2012-2119.html
https://www.redhat.com/security/data/cve/CVE-2012-2121.html
https://www.redhat.com/security/data/cve/CVE-2012-2123.html
https://www.redhat.com/security/data/cve/CVE-2012-2136.html
https://www.redhat.com/security/data/cve/CVE-2012-2137.html
https://www.redhat.com/security/data/cve/CVE-2012-2372.html
https://www.redhat.com/security/data/cve/CVE-2012-2373.html
https://access.redhat.com/security/updates/classification/#important
https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.2_Technical_Notes/kernel.html#RHSA-2012-0743
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFP3zJcXlSAg2UNWIIRAlFPAJ9ov0UCSkIqz63r+6YXL9bf0+ADOQCfUIzx
w/ZsFuOkCnr15/XGPkEszEQ=
=D/pm
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. (CVE-2011-4086)
Sasha Levin discovered a flaw in the permission checking for device
assignments requested via the kvm ioctl in the Linux kernel. (CVE-2012-0045)
A flaw was discovered in the Linux kernel's cifs file system. (CVE-2012-1090)
H.
(CVE-2012-1097)
A flaw was discovered in the Linux kernel's cgroups subset. (CVE-2012-1146)
A flaw was found in the Linux kernel's handling of paged memory. (CVE-2012-1179)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
linux-image-3.0.0-19-generic 3.0.0-19.33
linux-image-3.0.0-19-generic-pae 3.0.0-19.33
linux-image-3.0.0-19-omap 3.0.0-19.33
linux-image-3.0.0-19-powerpc 3.0.0-19.33
linux-image-3.0.0-19-powerpc-smp 3.0.0-19.33
linux-image-3.0.0-19-powerpc64-smp 3.0.0-19.33
linux-image-3.0.0-19-server 3.0.0-19.33
linux-image-3.0.0-19-virtual 3.0.0-19.33
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Ubuntu update for linux-lts-backport-oneiric
SECUNIA ADVISORY ID:
SA48987
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48987/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48987
RELEASE DATE:
2012-05-01
DISCUSS ADVISORY:
http://secunia.com/advisories/48987/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48987/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48987
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Ubuntu has issued an update for linux-lts-backport-oneiric.
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
ORIGINAL ADVISORY:
USN-1433-1:
https://lists.ubuntu.com/archives/ubuntu-security-announce/2012-May/001672.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04135307
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04135307
Version: 1
HPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control
Server Deployment, Multiple Remote Vulnerabilities affecting Confidentiality,
Integrity and Availability
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2014-03-10
Last Updated: 2014-03-10
Potential Security Impact: Multiple remote vulnerabilities affecting
confidentiality, integrity and availability
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential vulnerabilities have been identified with HP Rapid Deployment Pack
(RDP) or HP Insight Control Server Deployment. The vulnerabilities could be
exploited remotely affecting confidentiality, integrity and availability.
References: CVE-2010-4008
CVE-2010-4494
CVE-2011-2182
CVE-2011-2213
CVE-2011-2492
CVE-2011-2518
CVE-2011-2689
CVE-2011-2723
CVE-2011-3188
CVE-2011-4077
CVE-2011-4110
CVE-2012-0058
CVE-2012-0879
CVE-2012-1088
CVE-2012-1179
CVE-2012-2137
CVE-2012-2313
CVE-2012-2372
CVE-2012-2373
CVE-2012-2375
CVE-2012-2383
CVE-2012-2384
CVE-2013-6205
CVE-2013-6206
SSRT101443
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Rapid Deployment Pack (RDP) -- All versions
HP Insight Control Server Deployment -- All versions
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2013-6205 (AV:L/AC:M/Au:S/C:P/I:P/A:P) 4.1
CVE-2013-6206 (AV:N/AC:L/Au:N/C:C/I:P/A:P) 9.0
CVE-2010-4008 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2010-4494 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
CVE-2011-2182 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2
CVE-2011-2213 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
CVE-2011-2492 (AV:L/AC:M/Au:N/C:P/I:N/A:N) 1.9
CVE-2011-2518 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
CVE-2011-2689 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
CVE-2011-2723 (AV:A/AC:M/Au:N/C:N/I:N/A:C) 5.7
CVE-2011-3188 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2011-4077 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9
CVE-2011-4110 (AV:L/AC:L/Au:N/C:N/I:N/A:P) 2.1
CVE-2012-0058 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
CVE-2012-0879 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
CVE-2012-1088 (AV:L/AC:M/Au:N/C:N/I:P/A:P) 3.3
CVE-2012-1179 (AV:A/AC:M/Au:S/C:N/I:N/A:C) 5.2
CVE-2012-2137 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9
CVE-2012-2313 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2
CVE-2012-2372 (AV:L/AC:M/Au:S/C:N/I:N/A:C) 4.4
CVE-2012-2373 (AV:L/AC:H/Au:N/C:N/I:N/A:C) 4.0
CVE-2012-2375 (AV:A/AC:H/Au:N/C:N/I:N/A:C) 4.6
CVE-2012-2383 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
CVE-2012-2384 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP recommends that HP Rapid Deployment Pack (RDP) or HP Insight Control
Server Deployment should only be run on private secure networks to prevent
the risk of security compromise.
HISTORY
Version:1 (rev.1) - 10 March 2014 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners
| VAR-201203-0551 | No CVE | Citrix Licensing Administration Console Denial of Service Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Citrix Licensing is prone to a denial-of-service vulnerability.
A remote attacker can leverage this issue to crash the affected application, denying service to legitimate users.
Citrix Licensing 11.6.1 build 10007 is vulnerable; other versions may also be affected.
| VAR-201204-0228 | CVE-2012-1180 | nginx Vulnerability in which important information is obtained |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request. nginx is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to harvest sensitive information that may lead to further attacks. BUGTRAQ ID: 52578 CVE ID: CVE-2012-1180 nginx is a widely used high-performance web server. There is an information disclosure vulnerability in nginx's implementation of processing malformed HTTP responses from upstream servers. 0 nginx 1.0.9 nginx 1.0.8 nginx 1.0.10 Vendor patch: Igor Sysoev ----------- At present, the vendor has released an upgrade patch to fix this security problem, please go to the vendor's homepage to download: http ://nginx.net/. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201203-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: nginx: Multiple vulnerabilities
Date: March 28, 2012
Bugs: #293785, #293786, #293788, #389319, #408367
ID: 201203-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in nginx, the worst of which
may allow execution of arbitrary code.
Background
==========
nginx is a robust, small, and high performance HTTP and reverse proxy
server.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/nginx < 1.0.14 >= 1.0.14
Description
===========
Multiple vulnerabilities have been found in nginx:
* The TLS protocol does not properly handle session renegotiation
requests (CVE-2009-3555).
* The "ngx_http_process_request_headers()" function in ngx_http_parse.c
could cause a NULL pointer dereference (CVE-2009-3896).
* nginx does not properly sanitize user input for the the WebDAV COPY
or MOVE methods (CVE-2009-3898).
* The "ngx_resolver_copy()" function in ngx_resolver.c contains a
boundary error which could cause a heap-based buffer overflow
(CVE-2011-4315).
* nginx does not properly parse HTTP header responses which could
expose sensitive information (CVE-2012-1180).
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the nginx process, cause a Denial of Service condition,
create or overwrite arbitrary files, or obtain sensitive information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All nginx users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/nginx-1.0.14"
References
==========
[ 1 ] CVE-2009-3555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555
[ 2 ] CVE-2009-3896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896
[ 3 ] CVE-2009-3898
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898
[ 4 ] CVE-2011-4315
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4315
[ 5 ] CVE-2012-1180
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1180
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201203-22.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2012:043
http://www.mandriva.com/security/
_______________________________________________________________________
Package : nginx
Date : March 29, 2012
Affected: 2010.1, 2011.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1180
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2010.1:
44b081cef04380c1b45336962f9e9c4a 2010.1/i586/nginx-0.8.41-1.1mdv2010.2.i586.rpm
ba57a417d0064fb122694b5dacedb1dd 2010.1/SRPMS/nginx-0.8.41-1.1mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64:
0008b13952f6f57c14efabeba5fbc717 2010.1/x86_64/nginx-0.8.41-1.1mdv2010.2.x86_64.rpm
ba57a417d0064fb122694b5dacedb1dd 2010.1/SRPMS/nginx-0.8.41-1.1mdv2010.2.src.rpm
Mandriva Linux 2011:
dd738ba12a2127a78731eabb19129045 2011/i586/nginx-1.0.5-1.1-mdv2011.0.i586.rpm
5ee13d12672c9cd141449bd0dc024479 2011/SRPMS/nginx-1.0.5-1.1.src.rpm
Mandriva Linux 2011/X86_64:
d4af6f92f3508722e79dad2a5d12f269 2011/x86_64/nginx-1.0.5-1.1-mdv2011.0.x86_64.rpm
5ee13d12672c9cd141449bd0dc024479 2011/SRPMS/nginx-1.0.5-1.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFPc/zbmqjQ0CJFipgRAsXqAKCDpT1SDD6heEKkG4xtUvKB19ofhgCgihpF
qZLFGHfgElxAFfkUZ3nIlDw=
=VETw
-----END PGP SIGNATURE-----
.
For the stable distribution (squeeze), this problem has been fixed in
version 0.7.67-3+squeeze2.
For the unstable distribution (sid), this problem has been fixed in
version 1.1.17-1.
We recommend that you upgrade your nginx packages. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
Debian update for nginx
SECUNIA ADVISORY ID:
SA48465
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48465/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48465
RELEASE DATE:
2012-03-20
DISCUSS ADVISORY:
http://secunia.com/advisories/48465/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48465/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48465
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Debian has issued an update for nginx. This fixes a weakness, which
can be exploited by malicious people to disclose certain sensitive
information.
For more information:
SA48366
SOLUTION:
Apply updated packages via the apt-get package manager.
ORIGINAL ADVISORY:
DSA-2434-1:
http://www.debian.org/security/2012/dsa-2434
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201208-0454 | CVE-2012-4582 | McAfee Email and Web Security and McAfee Email Gateway Vulnerable to resetting the password of any administrator account |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote authenticated users to reset the passwords of arbitrary administrative accounts via unspecified vectors.
A remote attacker could leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Exploiting the information-disclosure issues allow the attacker to view local files within the context of the Web server process.
Exploiting the security-bypass vulnerability allows attackers to bypass security restrictions and obtain sensitive information or perform unauthorized actions.
Exploiting the directory-traversal issue allows attackers to use directory-traversal strings to retrieve arbitrary files in the context of the affected application.
Exploiting the insecure-encryption issue allows attackers to determine encryption keys, which may lead to further attacks. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester!
Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface.
Download it here!
http://secunia.com/psi_30_beta_launch
----------------------------------------------------------------------
TITLE:
McAfee Email and Web Security Appliance and Email Gateway Multiple
Vulnerabilities
SECUNIA ADVISORY ID:
SA48406
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/48406/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=48406
RELEASE DATE:
2012-03-14
DISCUSS ADVISORY:
http://secunia.com/advisories/48406/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/48406/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48406
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A weakness and multiple vulnerabilities have been reported in McAfee
Email and Web Security Appliance and McAfee Email Gateway, which can
be exploited by malicious users to disclose sensitive information and
bypass certain security restrictions and by malicious people to
conduct cross-site scripting and brute force attacks.
1) Certain unspecified input is not properly sanitised before being
returned to the user.
2) An error in the reset password functionality can be exploited to
reset the password of administrative users.
3) An error within the Dashboard discloses active session tokens and
can be exploited to hijack another user's session.
4) The system backup stores passwords with weak encryption and can be
exploited to decrypt the passwords via brute force attacks.
5) Certain unspecified input is not properly verified before being
used to download files. This can be exploited to download arbitrary
files from local resources via directory traversal sequences.
6) An unspecified error can be exploited to disclose the contents of
files.
Note: A weakness due to the server-side session remaining active has
also been reported.
SOLUTION:
Update to a fixed version:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Ben Williams, NGS Secure
ORIGINAL ADVISORY:
https://kc.mcafee.com/corporate/index?page=content&id=SB10020
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------