TITLE: Kaspersky Anti-Virus Engine Malformed Archives Virus Detection Bypass SECUNIA ADVISORY ID: SA17188 VERIFY ADVISORY: http://secunia.com/advisories/17188/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Kaspersky SMTP Gateway 5.x http://secunia.com/product/4100/ Kaspersky Anti-Virus 4.x http://secunia.com/product/916/ DESCRIPTION: fRoGGz has reported a weakness in Kaspersky Anti-Virus scan engine, which can be exploited by malware to bypass certain scanning functionality. For more information: SA17126 The weakness affects version 4.0.1.14 when scanning emails containing malformed ".zip", ".rar" and ".arj" archives. Other versions may also be affected. NOTE: This is not an issue on client systems, as the malware is still detected upon execution by the desktop on-access scanner. SOLUTION: Desktop on-access scanner should be used to ensure that the malware is detected upon extraction. Filter all compressed file archives at border gateways if they are not required. PROVIDED AND/OR DISCOVERED BY: fRoGGz, SecuBox Labs OTHER REFERENCES: SA17126: http://secunia.com/advisories/17126/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------