Ahnlab V3杀毒软件文档格式处理远程溢出漏洞

Ahnlab V3杀毒软件文档格式处理远程溢出漏洞

漏洞ID 1197557 漏洞类型 缓冲区溢出
发布时间 2005-10-23 更新时间 2005-10-24
图片[1]-Ahnlab V3杀毒软件文档格式处理远程溢出漏洞-安全小百科CVE编号 CVE-2005-3284
图片[2]-Ahnlab V3杀毒软件文档格式处理远程溢出漏洞-安全小百科CNNVD-ID CNNVD-200510-179
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2005100038
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200510-179
|漏洞详情
AhnlabV3是韩国安博士(AhnLab)公司的一套网络安全综合解决方案。该方案能够抵御各类病毒、间谍软件、木马,确保电脑、网络、邮件以及个人信息处于安全的保护中。AhnlabV3杀毒软件在解析各种文档格式时存在一个远程溢出漏洞。攻击者可以创建恶意的文档并诱骗用户使用杀毒软件扫描,导致以系统权限非授权访问系统。
|漏洞EXP
======================================================================

Secunia Research 13/10/2005

- AhnLab V3 Antivirus ALZ/UUE/XXE Archive Handling Buffer Overflow -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software

AhnLab V3Pro 2004 (V3 VirusBlock 2005 international) (Build 6.0.0.457)
AhnLab V3Net for Windows Server 6.0 (Build 6.0.0.457)
AhnLab MyV3 with AzMain.dll 1.3.11.15

Prior versions may also be affected.

====================================================================== 
2) Severity

Rating: Highly critical
Impact: System access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in AhnLab V3 
Antivirus, which can be exploited by malicious people to compromise
a vulnerable system.

The vulnerability is caused due to a boundary error in the archive
decompression library when reading the filename of a compressed file 
from an ALZ, UUE or XXE archive. This can be exploited to cause a 
stack-based buffer overflow (ALZ), or a heap-based buffer overflow
(UUE/XXE), when a malicious ALZ/UUE/XXE archive is scanned.

Successful exploitation allows arbitrary code execution, but requires 
that compressed file scanning is enabled.

====================================================================== 
4) Solution

AhnLab V3Pro 2004 (V3 VirusBlock 2005 international):
Update to version 6.0.0.488 via Smart Update.

AhnLab V3Net for Windows Server 6.0:
Update to version 6.0.0.488 via Smart Update.

AhnLab MyV3:
The vulnerability has reportedly been fixed in the vendor's Korean
MyV3 website.

====================================================================== 
5) Time Table

19/09/2005 - Initial vendor notification.
20/09/2005 - Initial vendor response.
13/10/2005 - Vendor releases advisory.
13/10/2005 - Public disclosure.

====================================================================== 
6) Credits

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

AhnLab:
http://global.ahnlab.com/security/security_advisory002.html

====================================================================== 
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-48/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================
|参考资料

来源:SECUNIA
名称:16851
链接:http://secunia.com/advisories/16851
来源:MISC
链接:http://secunia.com/secunia_research/2005-48/advisory/
来源:global.ahnlab.com
链接:http://global.ahnlab.com/security/security_advisory002.html
来源:BID
名称:15091
链接:http://www.securityfocus.com/bid/15091
来源:BUGTRAQ
名称:20051013SecuniaResearch:AhnLabV3AntivirusALZ/UUE/XXEArchiveHandlingBufferOverflow
链接:http://www.securityfocus.com/archive/1/413260
来源:OSVDB
名称:19955
链接:http://www.osvdb.org/19955
来源:SREASON
名称:80
链接:http://securityreason.com/securityalert/80

相关推荐: KDE Konqueror Bitmap File Processing Denial of Service Vulnerability

KDE Konqueror Bitmap File Processing Denial of Service Vulnerability 漏洞ID 1098559 漏洞类型 Failure to Handle Exceptional Conditions 发布…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享