Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - eTrust Antivirus: bypassing via CAB, ELF

April 2012 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can create an archive or a program containing a virus,
which is not detected by eTrust Antivirus.

Severity: 2/4

Creation date: 21/03/2012

IMPACTED PRODUCTS

 eTrust Antivirus

DESCRIPTION OF THE VULNERABILITY

Tools extracting archives (CAB.) accept to extract archives which
are slightly malformed. Systems also accept to execute programs
(ELF) which are slightly malformed. However, eTrust Antivirus does
not detect viruses contained in these archives/programs.

An ELF program containing a large "identsize" field bypasses the
detection. [severity:2/4; BID-52595, CVE-2012-1440]

An ELF program containing a large "encoding" field bypasses the
detection. [severity:2/4; BID-52600, CVE-2012-1446]

A CAB archive containing a large "coffFiles" field bypasses the
detection. [severity:1/4; BID-52621, CVE-2012-1453]

An attacker can therefore create an archive containing a virus
which is not detected by the antivirus, but which is extracted by
extraction tools. The virus is then detected once it has been
extracted on victim’s computer. An attacker can also create a
program, containing a virus which is not detected by the
antivirus, but which can be run by the system.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/eTrust-Antivirus-bypassing-via-CAB-ELF-11478


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts