what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ESET Generic Malformed Archive Bypass

ESET Generic Malformed Archive Bypass
Posted Feb 13, 2020
Authored by Thierry Zoller

The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus
SHA-256 | e2f741cde9f439ac70973eeae7d76a4af0d0b4eb7a85e38074a57965ddaf71b3

ESET Generic Malformed Archive Bypass

Change Mirror Download
________________________________________________________________________

From the low-hanging-fruit-department
ESET Generic Malformed Archive Bypass (BZ2 Checksum)
________________________________________________________________________

Release mode : Coordinated Disclosure
Ref : [TZO-11-2020] - ESET Generic Malformed Archive Bypass
(BZ2 Checksum)
Vendor : ESET
Status : Patched
CVE : Unknown
Dislosure Policy: https://caravelahq.com/b/policy/20949
Blog :
https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html
Vendor Advisory : https://support.eset.com/en/modules-review-november-2019



Affected Products
=================
All below version v. 1294

ESET Smart Security Premium
ESET Internet Security
ESET NOD32 Antivirus
ESET Cyber Security Pro (MAC)
ESET Cyber Security (MAC)
ESET Mobile Security for Android
ESET Smart TV Security
ESET NOD32 Antivirus 4 for Linux Desktop


I. Background
----------------------------
"For three decades we've been helping people to protect their digital
worlds. From a small,
dynamic company we've grown into a global brand with over 110 million
users in 202 countries
and territories. Many things have changed, but our core aspirations,
philosophy and values
remain the same – to help build a more secure digital world where
everyone can truly Enjoy
Safer Technology."

II. Description
----------------------------
The parsing engine supports the ZIP archive format. The parsing engine
can be bypassed
by specifically manipulating an ZIP Archive Compression Information
Field so that it can
be accessed by an end-user but not the Anti-Virus software. The AV
engine is unable to
scan the container and gives the file a "clean" rating.

I may release further details after all known vulnerable vendors have
patched their products.


III. Impact
----------------------------
Impacts depends on the contextual use of the product and engine within
the organisation
of a customer. Gateway Products (Email, HTTP Proxy etc) may allow the
file through unscanned
and give it a clean bill of health. Server side AV software will not be
able to discover
any code or sample contained within this ISO file and it will not raise
suspicion even
if you know exactly what you are looking for (Which is for example great
to hide your implants
or Exfiltration/Pivot Server).

There is a lot more to be said about this bug class, so rather than bore
you with it in
this advisory I provide a link to my 2009 blog post
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

IV. Patch / Advisory
----------------------------
Reported submissions were fixed in new version (v. 1296) of unpacker module


Thanks to ESET for their customer focused approach to coordinating this
vulnerability.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close