Twenty Year Anniversary

iDEFENSE Security Advisory 2003-02-10.t

iDEFENSE Security Advisory 2003-02-10.t
Posted Feb 11, 2003
Authored by iDefense Labs, Knud Erik Hojgaard | Site idefense.com

iDEFENSE Security Advisory 02.10.03: Eset Software's NOD32 Antivirus System is a cross-platform anti-virus application which contains a locally exploitable buffer overflow on the Unix version which could allow attackers to gain root privileges.

tags | advisory, overflow, root, virus
systems | unix
MD5 | ba0b96902c8a41dfb8e496a891596528

iDEFENSE Security Advisory 2003-02-10.t

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 02.10.03:
http://www.idefense.com/advisory/02.10.03.txt
Buffer Overflow In NOD32 Antivirus Software for Unix
February 10, 2003

I. BACKGROUND

Eset Software's NOD32 Antivirus System is a cross-platform anti-virus
application. The Linux, FreeBSD, OpenBSD and NetBSD versions are compiled
from the same sources, which the vendor refers to as "nod32 for UNIX".
More information is available at http://www.nod32.com/products/unix.htm .


II. DESCRIPTION

Local exploitation of a buffer overflow in NOD32 for UNIX could allow
attackers to gain super-user (root) privileges. The overflow occurs when
NOD32 parses a path with a name of length greater than 500 characters
(/tmp/AAAAA....AAA). An attacker can overwrite the first three bytes of
the eax and ecx registers, as can be seen from the following GDB output:

...
Program received signal SIGSEGV, Segmentation fault.
0x4207fa78 in strcmp () from /lib/i686/libc.so.6
(gdb) bt
#0 0x4207fa78 in strcmp () from /lib/i686/libc.so.6
#1 0x0804c2ba in scan_dir ()
#2 0x41414141 in ?? ()
Cannot access memory at address 0x41414141
(gdb) info registers
eax 0x4141414c 1094795596
ecx 0x4141414c 1094795596
...


III. ANALYSIS

Exploitation allows local code execution with the privileges of the user
who spawned NOD32. This is possible by creating an exploit path and then
socially engineering a target user into scanning over the exploit path
using NOD32. If the attacker has write permissions to a directory that is
routinely scanned with NOD32 (such as /tmp), he or she can gain the
privileges of the scanning user (usually root).

Proof of concept exploit code has been written for the FreeBSD 4.7
platform. The following is a sample exploit run that should set up shell
code in an environment variable and spawn a shell under the privileges of
the user executing NOD32:

$ perl eggnod.pl
$ mkdir -p /tmp/`perl -e 'print "A" x 255'`/`perl -e 'print "B" x 240 .
"\xfc\xbf\xbf"'`
$ nod32 /tmp

IV. DETECTION

NOD32 Antivirus System for Unix version 1.012 and below is vulnerable.

V. VENDOR FIX

The latest version 1.013 fixes the issue and can be downloaded from
http://www.nod32.com

VI. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2003-0062 to this issue.

VII. DISCLOSURE TIMELINE

12/03/2003 Issue disclosed to iDEFENSE
01/28/2003 Eset Software notified (webmaster@nod32.com)
01/28/2003 iDEFENSE clients notified
02/03/2003 Response received from Palo Luka (luka@eset.sk)
02/10/2003 Coordinated Public Disclosure

VIII. CREDIT

Knud Erik Højgaard (knud@skodliv.dk) discovered this vulnerability.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPkfzW/rkky7kqW5PEQKkewCeK1LtKKAbOBomO1Z+X0Hx3KOSo0QAn0bq
IG8QNLPx0YhWknMOuwtLr7Iw
=v7iF
-----END PGP SIGNATURE-----


To stop receiving iDEFENSE Security Advisories, reply to this message and
put "unsubscribe" in the subject.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    8 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close