lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 10 Dec 2008 17:27:26 +0530
From: "iViZ Security Advisories" <advisories@...zsecurity.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [IVIZ-08-013] Avast antivirus for Linux multiple
	vulnerabilities

-----------------------------------------------------------------------
[ iViZ Security Advisory 08-013                            10/12/2008 ]
-----------------------------------------------------------------------
iViZ Techno Solutions Pvt. Ltd.
                                            http://www.ivizsecurity.com
-----------------------------------------------------------------------

* Title:     Avast antivirus for Linux multiple vulnerabilities.
* Date:      10/12/2008
* Software:  Avast for Workstations v1.0.8

--[ Synopsis:

    Multiple buffer overflows were discovered in the GNU/Linux
    version of Avast when analyzing corrupted ISO and RPM files.

--[ Affected Software:

  * Avast for Workstations v1.0.8 Trial versions, possibly others.

--[ Impact:

    Remove DoS, possibly remote code execution.

--[ Vendor response:

  * On September 24th 2008, the vendor stated :
    "With (the) mentioned version of avast4workstation 1.0.8_2, indeed,
    this bug existed. It was a stack-overflow, caused by cycling over
    intertwined directories on corrupted ISO files. All versions built
    since 22.1.2008 have this fixed. Thanks for your report."

--[ Credits:

    This vulnerability was discovered by Security Researcher
    Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:

  * First private disclosure to vendor on September 18th 2008.
  * First vendor reply on September 19th 2008.
  * On September 23th 2008, the vendor claims to have fixed the problem :
    "my colleague identified the problem few minutes ago as a bug which was
    fixed 22. Jan 2008."
  * On October 15th 2008, the vulnerable trial version link hasn't been updated:
    http://download664.avast.com/files/linux/avast4workstation_1.0.8-2_i386.deb

--[ Reference:

    http://www.ivizsecurity.com/security-advisory.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ