Vigil@nce - TrendMicro antivirus: bypassing via CAB, RAR, TAR, ZIP
March 2012 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can create an archive containing a virus, which is not
detected by TrendMicro antivirus.
Severity: 1/4
Creation date: 21/03/2012
IMPACTED PRODUCTS
– Trend Micro OfficeScan
– Trend Micro ScanMail
DESCRIPTION OF THE VULNERABILITY
Tools extracting archives accept to extract archives which are
slightly malformed. However, TrendMicro antivirus does not detect
viruses contained in these archives.
A TAR archive containing "\50\4B\03\04" as its first 4 bytes
bypasses the detection. [severity:1/4; BID-52580, CVE-2012-1425]
A RAR archive containing "MZ" as its first 2 bytes bypasses the
detection. [severity:1/4; BID-52612, CVE-2012-1443]
A CAB archive containing a large "cbCabinet" field bypasses the
detection. [severity:1/4; BID-52603, CVE-2012-1448]
A CAB archive containing a large "coffFiles" field bypasses the
detection. [severity:1/4; BID-52621, CVE-2012-1453]
A ZIP archive starting by TAR data bypasses the detection.
[severity:1/4; BID-52608, CVE-2012-1456]
A TAR archive with a large size bypasses the detection.
[severity:1/4; BID-52610, CVE-2012-1457]
A TAR archive with a header containing a large value bypasses the
detection. [severity:1/4; BID-52623, CVE-2012-1459]
A TAR+GZ archive containing two streams bypasses the detection.
[severity:1/4; BID-52626, CVE-2012-1461]
An attacker can therefore create an archive containing a virus
which is not detected by the antivirus, but which is extracted by
extraction tools. The virus is then detected once it has been
extracted on victim’s computer.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/TrendMicro-antivirus-bypassing-via-CAB-RAR-TAR-ZIP-11476