Security-Alerts mailing list archive (firstname.lastname@example.org)
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[security-alerts] FW: [SA26124] NOD32 Antivirus Multiple File Processing Vulnerabilities
> NOD32 Antivirus Multiple File Processing Vulnerabilities
> SECUNIA ADVISORY ID:
> VERIFY ADVISORY:
> Highly critical
> DoS, System access
> From remote
> NOD32 for Domino 2.x
> NOD32 for DOS 1.x
> NOD32 for FreeBSD 1.x
> NOD32 for Linux 1.x
> NOD32 for MS Exchange Server 0.x
> NOD32 for NetBSD 1.x
> NOD32 for Novell Netware Server 1.x
> NOD32 for OpenBSD 1.x
> NOD32 for Windows 95/98/ME 2.x
> NOD32 for Windows NT/2000/XP/2003 2.x
> Sergio Alvarez has reported some vulnerabilities in NOD32 Antivirus,
> which can be exploited by malicious people to cause a DoS (Denial of
> Service) or compromise a vulnerable system.
> 1) A race-condition error when processing CAB archives can be
> exploited to cause a heap corruption when e.g. scanning a specially
> crafted CAB archive.
> Successful exploitation may allow execution of arbitrary code.
> 2) A divide-by-zero error when processing Aspack and FSG packed files
> can be exploited to e.g. crash the application via a specially crafted
> Aspack or FSG packed file.
> 3) An integer-overflow error when processing Aspack packed files can
> be exploited to cause an infinite loop and consume large amounts of
> CPU resources via a specially crafted Aspack packed file.
> The vulnerabilities are reported in versions prior to update
> Apply update v.2.2289 or later.
> PROVIDED AND/OR DISCOVERED BY:
> Sergio Alvarez, n.runs AG
> ORIGINAL ADVISORY:
> n.runs AG: