what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Kaspersky Generic Malformed Archive Bypass

Kaspersky Generic Malformed Archive Bypass
Posted Feb 17, 2020
Authored by Thierry Zoller

The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus
SHA-256 | 120b942ba426b1b9b55e704db5b9c97a9ee87d788829b6e6ce558de71c97c890

Kaspersky Generic Malformed Archive Bypass

Change Mirror Download
________________________________________________________________________

From the low-hanging-fruit-department
Kaspersky Generic Malformed Archive Bypass (ZIP Filename Length)
________________________________________________________________________

Release mode : Coordinated Disclosure / Patched
Ref : [TZO-17-2020] - Kaspersky Generic Archive Bypass (ZIP
FLNMLEN)
Vendor : Kaspersky
Status : Patched
CVE : Unknown
Dislosure Policy:
https://blog.zoller.lu/p/release-mode-coordinated-disclosure.html
Vendor Advisory :
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219



Affected Products
=================
List of affected products
The issue affected Secure Connection product and consumer products in
those it is incorporated:

Kaspersky Secure Connection prior to version 4.0 (2020) patch E.
Kaspersky Internet Security prior to version 2020 patch E.
Kaspersky Total Security prior to version 2020 patch E.
Kaspersky Security Cloud prior to version 2020 patch E.

Fixed versions
Kaspersky Secure Connection 4.0 (2020) patch E.
Kaspersky Internet Security 2020 patch E.
Kaspersky Total Security 2020 patch E.
Kaspersky Security Cloud 2020 patch E.


I. Background
----------------------------
Kaspersky Lab is a multinational cybersecurity and anti-virus provider
headquartered in Moscow, Russia and operated by a holding company in the
United Kingdom. It was founded in 1997 . Kaspersky Lab develops and
sells antivirus, internet security, password management, endpoint
security, and other cybersecurity
products and services.


II. Description
----------------------------
The parsing engine supports the ZIP archive format. The parsing engine
can be bypassed by specifically manipulating an ZIP Archive (File Name
lenght Field) so that it can be accessed by an end-user but not the
Anti-Virus software. The AV engine is unable to scan the container and
gives the file a "clean" rating.

I may release further details after all known vulnerable vendors have
patched their engines.


III. Impact
----------------------------
Impacts depends on the contextual use of the product and engine within
the organisation of a customer. Gateway Products (Email, HTTP Proxy etc)
may allow the file through unscanned and give it a clean bill of health.
Server side AV software will not be able to discover any code or sample
contained within this ISO file and it will not raise suspicion even if
you know exactly what you are looking for (Which is for example great to
hide your implants or Exfiltration/Pivot Server).

There is a lot more to be said about this bug class, so rather than bore
you with it in
this advisory I provide a link to my 2009 blog post
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

IV. Patch / Advisory
----------------------------
Update to the respective available versions as found at
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219


Thanks go out to Kaspersky for their cooperation in responsibly patching
and disclosing this vulnerability.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close