exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AVAST Generic Evasion

AVAST Generic Evasion
Posted Apr 17, 2009
Authored by Thierry Zoller

The parsing engine in AVAST can be bypassed by a specially crafted and formated RAR archive. The bug results in denying the engine the possibility to inspect code within the RAR archive. There is no inspection of the content at all.

tags | advisory
SHA-256 | 71d1ca5d2a352a58e67248f0d06a4195472337d5f22e84e988c377d1a10de562

AVAST Generic Evasion

Change Mirror Download
______________________________________________________________________

From the low-hanging-fruit-department - AVAST bypass/evasion
______________________________________________________________________

Release mode: Forced release, vendor has not replied.
Ref : TZO-092009 - AVAST Generic Evasion
WWW : http://blog.zoller.lu/2009/04/release-mode-forced-release-vendor-has.html
Vendor : http://www.avast.com
Security notification reaction rating : Catastrophic

Disclosure Policy :
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products :
- List t.b.a when vendor cooperates (probably all versions)
- Known engine version to be affected - prior and post VPS:090409-0

As this bug has not been reproduced by the vendor, this limited advisory
relies on the assumption that my tests were conclusive and that the test
environment mimics the production environment.


I. Background
~~~~~~~~~~~~~
Quote: "Comprehensive network security solution for corporate customers
certified and tested by ICSA and Checkmark. It provides complete
server and desktop virus protection."

II. Description
~~~~~~~~~~~~~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR archive. Details are currently witheld :

A professional reaction to a vulnerability notification is a way to
measure the maturity of a vendor in terms of security. AVAST is given
a grace period of two (2) weeks to reply to my notification. Failure
to do so will result in POC being released in two (2) weeks.

AVAST (aswell as others) is advised to leave a specific security contact
at [1] in order to simplify getting in contact with them.

III. Impact
~~~~~~~~~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~~~~~~~~~~~~~~~~~~~~~~~~~

14/03/2009 : Send proof of concept, description the terms under which
I cooperate and the planned disclosure date. There is
no security adress listed at [1] and hence took the industry
standard security contacts addresses secure@ and security@.
secure@avast.de, secure@alwil.com, security@alwil.com
security@avast.de

No reply.

10/04/2009 : Resending specifying this is the last attempt to disclose
reponsibly. This time two known contact adresses that were
previously used to report vulnerabilities were used:
secalert@avast.com, vlk@avast.com

No reply.

17/04/2009 : Release of this advisory and begin of grace period.


[1] http://osvdb.org/vendor/1/ALWIL%20Software





Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close