Vigil@nce - eTrust Antivirus: bypassing via CAB, ELF
April 2012 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can create an archive or a program containing a virus,
which is not detected by eTrust Antivirus.
Severity: 2/4
Creation date: 21/03/2012
IMPACTED PRODUCTS
– eTrust Antivirus
DESCRIPTION OF THE VULNERABILITY
Tools extracting archives (CAB.) accept to extract archives which
are slightly malformed. Systems also accept to execute programs
(ELF) which are slightly malformed. However, eTrust Antivirus does
not detect viruses contained in these archives/programs.
An ELF program containing a large "identsize" field bypasses the
detection. [severity:2/4; BID-52595, CVE-2012-1440]
An ELF program containing a large "encoding" field bypasses the
detection. [severity:2/4; BID-52600, CVE-2012-1446]
A CAB archive containing a large "coffFiles" field bypasses the
detection. [severity:1/4; BID-52621, CVE-2012-1453]
An attacker can therefore create an archive containing a virus
which is not detected by the antivirus, but which is extracted by
extraction tools. The virus is then detected once it has been
extracted on victim’s computer. An attacker can also create a
program, containing a virus which is not detected by the
antivirus, but which can be run by the system.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/eTrust-Antivirus-bypassing-via-CAB-ELF-11478