Vulnerabilities galore

Posted by   Virus Bulletin on   Jun 1, 2007

May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors.

May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors.

At the start of the month details were revealed of a vulnerability affecting Alwil, Avira and Panda products. The flaw involved an error in the handling of the .zoo archive format, and could have been exploited to cause an infinite loop, resulting in extreme CPU utilization or even denial of service. Avira's Antivir product also suffered three further potentially exploitable vulnerabilities. These involved errors when processing LZH files, TAR files and UPX-compressed files.

Also in early May, Trend Micro released details of two buffer-overflow issues, which were thought to be exploitable only from the local system. More buffer overflows were reported in McAfee and CA products. In a wide range of McAfee products, a buffer overflow error in the Subscription Manager ActiveX control meant that it was possible for code to be executed from malicious websites, resulting in system compromise and remote access. A number of CA's anti-virus and anti-spyware products were affected by two buffer overflows. The vulnerabilities, which could only have been exploited from the local system, could have allowed escalated privileges.

A flaw revealed in the ActiveX control of some of Symantec's Norton products could also have been exploited by malicious websites to bypass security measures and allow remote access. It proved to be a tricky month all round for Symantec, with a false positive in its Norton Anti-virus product range rendering thousands of Chinese computers unusable after it flagged both netapi32.dll and lsasrv.dll as the Haxdoor backdoor trojan on certain Simplified Chinese language versions of Windows XP SP2. A number of enterprise customers are seeking compensation for losses incurred as a result of the disruption.

Back to the month's vulnerabilities: a flaw was revealed by FrSIRT in open source security software ClamAV. The flaw, which resides in the OLE2 parser, is potentially exploitable to cause denial of service. At the time of writing no official patch is available.

Finally, the end of the month saw news of vulnerabilities in Eset and F-Secure products. Two stack-overflow vulnerabilities were disclosed in Eset's NOD32 AntiVirus product, while F-Secure revealed a buffer overflow relating to LHA archive handling in a number of its products.

With the exception of the ClamAV flaw, patches for all vulnerabilities were available prior to the announcements being made. As always, VB urges users to ensure they are running the latest versions.

Posted on 01 June 2007 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.