what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Norman Generic Evasion

Norman Generic Evasion
Posted Jun 15, 2009
Authored by Thierry Zoller

Norman with decompression engine versions below 5.99.07 suffer from a RAR related bypass vulnerability.

tags | advisory, bypass
SHA-256 | 2752bd6cbaf45a3d245c65d2ae96d8968b3aaa13fc4e7e50d8bb6ee07d35ab7e

Norman Generic Evasion

Change Mirror Download
________________________________________________________________________

From the low-hanging-fruit-department
Norman generic evasion (RAR)
________________________________________________________________________

CHEAP Plug :
************
You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed
************

Release mode: Coordinated but limited disclosure.
Ref : [TZO-32-2009] - Norman generic evasion (RAR)
WWW : http://blog.zoller.lu/2009/06/advisory-norman-generic-evasion-rar.html
Vendor : http://www.norman.com
Status : Patched (with decompression engine version 5.99.07)
CVE : none provided
Credit : http://www.norman.com/support/security_bulletins/69333/en
OSVDB vendor entry: Norman is not listed as a vendor in OSVDB
Security notification reaction rating : ok
Notification to patch window : 77 days

Disclosure Policy : http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products :
The vulnerabilities have been fixed in Norman's compression library (NCL) 5.99.07,
relased on Norman's Internet update servers as an automatic update 03 June 2009.
This solves the vulnerability for all updated Norman's products except for
Norman Network Protection

- Norman Virus Control single user and corporate versions
- Norman Internet Control
- Norman Virus Control E-mail plugins
- Norman Endpoint Protection
- Norman Secuirty Suite
- Norman Network Protection
- Norman Virus Control for Lotus Domino
- Norman Virus Control for Exchange
- Norman Virus Control for Linux
- Norman Virus Control for Novell Netware (FireBreak)
- Norman Email Protection
- Norman Email Protection Appliance
- Norman Online Protection
- Norman Virus Control for AMaViS
- Norman Virus Control for MIMEsweeper

- Third party vendors that use the Engine

OEM vendors known to use the Norman engine :
- eeye



I. Background
~~~~~~~~~~~~~
Quote: "Norman ASA is a world leading company within the field of data security,
internet protection and analysis tools. Through its SandBox technology
Norman offers a unique and proactive protection unlike any other
competitor"


II. Description
~~~~~~~~~~~~~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all.

III. Impact
~~~~~~~~~~~
The bug results in denying the engine the possibility to inspect
code within the RAR archives. There is no inspection of content
at all.

A general description of the impact and nature of AV Bypasses/evasions
can be read at : http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html


IV. Disclosure time-line
~~~~~~~~~~~~~~~~~~~~~~~~~
DD/MM/YYYY
05/03/2009 : Send proof of concept (RAR Size), description the terms under which
I cooperate and the planned disclosure date.

No reply

13/03/2009 : Re-Send proof of concept (RAR Size), indicating this is the last attempt
to responsible disclose.

14/03/2009 : Norman acknowledges receipt

23/03/2009 : Send proof of concept (RAR Method)

23/03/2009 : Asking for an update for the RAR Size sample

02/04/2009 : Norman confirms reproduction of RAR Method PoC and that they will release
the patch a.s.a.p

02/04/2009 : Norman promises to get back with release dates/advisory information as soon
as they have some firm dates

06/04/2009 : Norman confirms reproduction of RAR Headflags PoC

20/04/2009 : Norman confirms reproduction of the CAB PoC and that all reported
vulnerabilities have been patched internaly.

22/04/2009 : Ask for a list of affected versions/products

no answer

27/04/2009 : Norman sends in the patched decompression DLL for me to if the patch
is correct.

28/04/2009 : Send TAR PoC file

no acknowledgement

07/05/2009 : Ask for an update to all reported bugs

no reply

08/05/2009 : Inform Norman that as I no longer receive any replies I assume that
the patch is deployed and set that the final disclosure date to
the 1.06.2009

09/05/2009 : Norman states they probably can't make the 1/06/2009

09/05/2009 : Propose to postpone disclosure upon request

28/05/2009 : Ask for an update as 01.06.2009 still is set

30/05/2009 : Norman asks to postpone the disclosure by a week as they
have to finish Q&A

09/06/2009 : Ask norman whether the Q&A has been finished

09/06/2009 : Norman replies the patches where deployed on the 3rd
of June.

10/06/2009 : Release of this advisory.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close