lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040710035924.2951.qmail@www.securityfocus.com>
Date: 10 Jul 2004 03:59:24 -0000
From: Bipin Gautam <visitbipin@...mail.com>
To: bugtraq@...urityfocus.com
Subject: Re: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]


In-Reply-To: <40EEE9C0.4040108@...ohosting.com>


>The same thing happens with classic mail bombs like 42.zip, NAV can't 
>handle them.
>
>Alan Parks

42.zip was a arc. BOMB and a different story... It's similar to my WinRar advisory that date back, 2003.

Well, within few seconds... after the AV scan have started norton quickly scan's the infected file and skips the empty folder within the zip archive! But after norton detects virus in the archive it tries to delete the virus within the archive, and re-create the un-infected/fresh archive........ again!
The problem triggers when NAV tries to re-create all the empty folders and re-construct the archive. *ANY* av scanners that autometically tries to delete the infected file and re-create the archive should be vulnerable to this exploit!!!

Note: in the "AutoProtect Menu" in the option tab in Norton AV the option........

*autometically repair the infected file <--- is set by default!
you could temporarily be immune by this bug by setting the option,
*deny access to the infected file. 

The compressed archive mustn't necessarily be a zip archive to trigger this attack. You could experiment this with other archive types......

bipin


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ