Vigil@nce: Sophos AV, denial of service via Packer and CAB
December 2008 by Vigil@nce
SYNTHESIS
An attacker can create a malicious Packed binary of a CAB file in
order to create a denial of service and eventually to execute code
in Sophos AV.
Gravity: 2/4
Consequences: denial of service of service
Provenance: document
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: unique source (2/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 10/12/2008
IMPACTED PRODUCTS
– Sophos Anti-Virus
DESCRIPTION
An attacker can create a malicious Packed binary of a CAB file in
order to create a denial of service and eventually to execute code
in Sophos AV.
Technical details are unknown.
This vulnerability may only impact Linux versions of the antivirus.
CHARACTERISTICS
Identifiers: BID-32748, IVIZ-08-015, VIGILANCE-VUL-8319