exploit the possibilities

Bitdefender Malformed Archive Bypass

Bitdefender Malformed Archive Bypass
Posted Jan 10, 2020
Authored by Thierry Zoller

The parsing engine for various Bitdefender products supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (HOST_OS) so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating.

tags | advisory, virus
MD5 | 81a8ef5675cb81458a3c0622ae1d3bb8

Bitdefender Malformed Archive Bypass

Change Mirror Download


From the low-hanging-fruit-department
Bitdefender Generic Malformed Archive Bypass (RAR HOST_OS)

Release mode : Forced Disclosurea
Ref : [TZO-07-2019] - Bitdefender Malformed Archive bypass
Vendor : Bitdefender
Status : Patched (amsiscan.dll >
CVE : Reserved 3 CVEs then pulled them back (Although
patching the vulnerability)
Dislosure Policy: https://caravelahq.com/b/policy/20949
Blog :
Vendor Advisory : No Advisory issued
Patch release : https://www.bitdefender.com/consumer/support/answer/10690/

Affected Products
All Bitdefender Products and Vendors that have licensed the Engine
before Dec 12 2019. Exact version is unknown as Bitdefender has not made
this public.

Quoting Bitdefender :
"All Bitdefender endpoint solutions (including but not limited to
Bitdefender Total Security,
Bitdefender Antivirus Free Edition, Bitdefender GravityZone) as well as
all products
using our engines."

Bitdefender Premium Security
Bitdefender Total Security 2020
Bitdefender Internet Security 2020
Bitdefender Antivirus Plus 2020
Bitdefender Family Pack 2020
Bitdefender Antivirus for Mac
Bitdefender Mobile Security for Android
Bitdefender Mobile Security for iOS

Bitdefender Small Office Security
GravityZone Business Security
GravityZone Advanced Business Security
Bitdefender Security for AWS
GravityZone Ultra Security
GravityZone Managed EDR
GravityZone Elite Security
GravityZone Enterprise Security
Security for Virtualized Environments
Security for Endpoints
Security for Mobiles
Security for Exchange
GravityZone Security for Storage

Vulnerable OEM Partners (According to AV-TEST):
Qihoo 360
Quick Heal

I. Background
"Since 2001, Bitdefender innovation has consistently delivered
award-winning security products and threat intelligence for people,
homes, businesses and their devices, networks and cloud services. Today,
Bitdefender is also the provider of choice, used in over 38% of the
world’s security solutions.
Recognized by industry, respected by vendors and evangelized by our
customers, Bitdefender is the cybersecurity company you can trust and
rely on."

II. Description
The parsing engine supports the RAR archive format. The parsing engine
can be bypassed by specifically manipulating an RAR Archive (HOST_OS) so
that it can be accessed by an end-user but not the Anti-Virus software.
The AV engine is unable to scan the archive and issues the file a
"clean" rating.

I may release further details after all known vulnerable vendors have
patched their products.

III. Impact
Impacts depends on the contextual use of the product and engine within
the organisation of a customer. Gateway Products (Email, HTTP Proxy etc)
may allow the file through unscanned and give it a clean bill of health.
Server side AV software will not be able to discover any code or sample
contained within this ISO file and it will not raise suspicion even if
you know exactly what you are looking for (Which is for example great to
hide your implants or Exfiltration/Pivot Server).

There is a lot more to be said about this bug class, so rather than bore
you with it in this advisory I provide a link to my 2009 blog post

IV. Patch / Advisory
If you are an enterprise customer I would suggest to reach out to
Bitdefender to discuss how you can be notified about patched
vulnerabilities within their products. Some releases may requires binary
updates that cant be pulled from the auto-update.

amsiscan.dll >

For Users of the OEM Partners (G-Data, Vipr, etc) I would suggest to get
in contact to ensure these vulnerabilities are patched or not present in
their offering. I would also suggest discussing how you can be made
aware of future patches.

V. Disclosure Timeline
See Previous Bitdefender disclosures :


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By