[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040110161356.25A05137E8@smtp2.aerasec.de>
Date: Sat, 10 Jan 2004 17:13:55 +0100
From: "Dr. Peter Bieringer" <pbieringer@...asec.de>
To: Steve Wray <steve.wray@...adise.net.nz>
Cc: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com
Subject: Re: bzip2 bombs still causes problems in antivirus-software
Steve Wray schreibt:
> It would probably be a good idea to implement ulimit
> restrictions on the user that the software runs as.
Mostly "root"...and this will cause sure other fun, looks like some software
didn't expect that file system runs out-of-space and still hang and have no
fail-safe mechanism here...
> Also you should be aware that the software doesn't automatically
> clear the leftovers out of the filesystem.
That's an additional suggestion for a smart decompression unit.
> One suggestion I've heard is to put the directory where the
> zip files get unpacked for software forensics & antivirus detection
> be on tmpfs or some such. That way, after a reboot its guaranteed
> to not be there. Or something like that. (my favorite sentence)
Good idea...but the best will be vendors implementing the decompression unit
in a proper way.
BTW: note that the temp file created by Trend Micro's vscan has permission
644. This can be an interesting issue for other local users which are
looking for data which they should normally prevent to see.
Regards,
Peter
--
Dr. Peter Bieringer Phone: +49-8102-895190
AERAsec Network Services and Security GmbH Fax: +49-8102-895199
Wagenberger Straße 1 Mobile: +49-174-9015046
D-85662 Hohenbrunn E-Mail: pbieringer@...asec.de
Germany Internet: http://www.aerasec.de
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists