what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Panda Generic Evasion

Panda Generic Evasion
Posted May 24, 2009
Authored by Thierry Zoller

The Panda parsing engine can be bypassed by a specially crafted CAB archive.

tags | advisory
SHA-256 | fa9e2c473bbcd3968fb0d5ba3f2f9b5dadd39e366e25f2815a3d29269c8faac8

Panda Generic Evasion

Change Mirror Download
________________________________________________________________________

From the low-hanging-fruit-department
Panda generic evasion (CAB)
________________________________________________________________________

Why are there two panda advisories instead of one ? See
http://blog.zoller.lu/2009/05/100th-post-what-about-big-guys.html

CHEAP Plug :
************************************************************************
You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!
************************************************************************

Release mode: Coordinated but limited disclosure.
Ref : TZO-24-2009 - Panda generic evasion (CAB)
WWW : http://blog.zoller.lu/2009/04/why-are-there-two-panda-advisories.html
Vendor : http://www.pandasecurity.com
Status : Patched (Through hotfix and automatic update)
CVE : none provided
OSVDB listing: No [1]
Credit :
http://www.pandasecurity.com/homeusers/support/card?id=80060&idIdioma=2
http://www.pandasecurity.com/homeusers/support/card?id=60039&idIdioma=2
http://www.pandasecurity.com/homeusers/support/card?id=70025&idIdioma=2

Security notification reaction rating : Good
Notification to patch window : +-32 days

Disclosure Policy :
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products :
- Global Protection 2009 (Hotifx)
- Internet Security 2009 (Hotifx)
- Panda Antivirus Pro 2009 (Hotfix)
- Panda Security for Business with Exchange
- Panda Security for Business
- Panda Security for Enterprise
- Panda GateDefender Integra (patched through automatic updates)
- Panda GateDefender Performa (patched through automatic updates)
- Panda AdminSecure (patched thorugh automatic updates)

SaaS
- Panda Managed Office Protection
- TrustLayer Mail
Quote : "What virus protection guarantees does TrustLayer offer?
With respect to the antivirus filtering service, TrustLayer
offers a 100% virus-free contractual guarantee."

I. Background
~~~~~~~~~~~~~
Quote: "Panda Security is one of the world's leading creators
and developers of technologies, products and services for
keeping clients' IT resources free from viruses and other
computer threats at the lowest possible Total Cost of Ownership."

II. Description
~~~~~~~~~~~~~~~
The parsing engine can be bypassed by a specially crafted CAB
archive.

III. Impact
~~~~~~~~~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within CAB archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.

IV. Disclosure timeline
~~~~~~~~~~~~~~~~~~~~~~~~~
DD/MM/YYYY
13/04/2009 : Send proof of concept CAB, description the terms under which
I cooperate and the planned disclosure date

13/04/2009 : Panda acks receipt and starts investigating

15/04/2009 : Panda denies DoS and bypass condition and considers the bug a reporting
issue as a MAX Size rule blocks the sample.

16/04/2009 : Ask if the Gatedefender product ranges, detects, flags or
blocks the POC file.

17/04/2009 : Provide a new POC file to Panda that aims at evading
the Max Size rule and detection.

17/04/2009 : Panda acks receipt and will investigate.

20/04/2009 : Inform Panda that I sent the wrong POC on the 17/04/2009
and attached the correct one.

28/04/2009 : Ping Panda for updates

28/04/2009 : Panda states that they are planning the patch timeline
and will inform me asap.

21/05/2009 : Panda informs me of the release of hotfixes and affected
Products.

22/05/2009 : Ask for clarification on affected products

22/05/2009 : Release of this advisory.



[1]
Panda is invited to leave their security contact e-mail address at
http://osvdb.org/vendor/1/Panda%20Software .



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close