what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

n.runs-SA-2007.027.txt

n.runs-SA-2007.027.txt
Posted Aug 25, 2007
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been discovered in the file parsing engine of Sophos AntiVirus versions prior to 2.48.0. The bug exists during the file parsing of UPX packed files.

tags | advisory
SHA-256 | f395eb9a9a434a0d7874ad93774918496b0153b1768bc41f0d455f7356e396cc

n.runs-SA-2007.027.txt

Change Mirror Download
n.runs AG             
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2007.027 24-Aug-2007
________________________________________________________________________

Vendor: Sophos, http://www.sophos.com
Affected Products:
Sophos Anti-Virus for Windows
Sophos Anti-Virus for Unix/Linux
Vulnerability: Arbitrary Code Execution (remote)
Risk: HIGH
________________________________________________________________________

Vendor communication:

2007/05/07 initial notification to Sophos
2007/05/09 Sophos Response
2007/05/14 PGP public keys exchange
2007/05/14 PoC files sent to Sophos
2007/05/17 Sophos acknowledged the PoC files
2007/05/17 Sophos Corporation validate the Vulnerability
2007/05/17 Sophos notify tentative update release date
2007/07/31 Sophos notify a delay in the update release date
2007/08/23 Sophos Update with fixes released
________________________________________________________________________

Overview:

Sophos is a world leader in IT security and control solutions purpose-built
for business, education, government organizations and service providers.
Their reliably engineered, easy-to-operate products protect over 100 million
users in more than 150 countries from viruses, spyware, adware, Trojans,
intrusion, spam, policy abuse, and uncontrolled network access.

Description:

A remotely exploitable vulnerability has been found in the file parsing
engine.

In detail, the following flaw was determined:

- Infinite Loop in UPX packed files parsing


Impact:

This problem can lead to remote denial of service or arbitrary code
execution if an attacker carefully crafts a file that exploits the
aforementioned vulnerability. The vulnerability is present in Sophos
Anti-virus software listed above on all platforms supported by the affected
products prior to the engine Version 2.48.0.

Solution:
The vulnerability was reported on 07.May.2007 and an update has been issued
on 23.Aug.2007 to solve this vulnerability. For detailed information about
the fixes follow the link in the References [1] section of this document.
n.runs AG wants to highlight the excellent and fluent communication with
Sophos.
________________________________________________________________________

Credit:
Bugs found by Sergio Alvarez of n.runs AG.
________________________________________________________________________

References:
http://www.sophos.com/support/knowledgebase/article/28407.html [1]

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
________________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an "as is" condition. All warranties are excluded. In
no event shall n.runs be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special
damages, even if n.runs has been advised of the possibility of such damages.


Copyright 2007 n.runs AG. All rights reserved. Terms of use apply.

Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close