[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <OF13903C66.6BB5E49F-ONC12570BB.002ACA23-C12570BB.002AE961@marcegaglia.com>
Date: Wed, 16 Nov 2005 08:48:43 +0100
From: Marco Monicelli <marco.monicelli@...cegaglia.com>
To: "alert7@...cus.org" <alert7@...cus.org>
Cc: full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org,
bugtraq@...urityfocus.com
Subject: Re: [xfocus-AD-051115]Multiple antivirus failed
to scan malicous filename bypass vulnerability
Alert7, you forgot to test the vulnerability on NOD32 antivirus. It's
actually very famous and quite reliable product so I think you should
definitively test it too.
Cheers
Yog-Sotho
"alert7@...cus.or
g"
<alert7@...cus.or To
g> full-disclosure@...ts.grok.org.uk,
bugtraq@...urityfocus.com,
15/11/2005 06.59 vulnwatch@...nwatch.org
cc
Subject
[xfocus-AD-051115]Multiple
antivirus failed to scan malicous
filename bypass vulnerability
[xfocus-AD-051115]Multiple antivirus failed to scan malicous filename
bypass vulnerability
discoverer by killer@...cus.org
class: design error
Threat level: medium
Vulnerable anti-virus Engine:
Kaspersky Antivirus
Symantec AntiVirus
F-Prot Antivirus
ClamWin Antivirus
Avast Antivirus
RAV AntiVirus
Microsoft AntiSpyware
tested anti-virus vendor:
Symantec AntiVirus Corporate 8.0
Kaspersky Antivirus Personal Pro 4.5.0.104
Kaspersky Antivirus For MS NTServer 4.5.0.104
F-Prot Antivirus 3.16c
ClamWin Antivirus 0.87
Avast.Professional.Edition.v4.6.603
RAV.AntiVirus.Desktop.v8.6
Microsoft AntiSpyware beta1
1.Summary:
------------
Windows system may use the many kinds of special mark as filename,
some anti-virus engines are unable to analyze the special structure
document filename, thus failed to file operate.
2. Detail:
------------
Demonstration here:
Choose a malicious file which would be detected, such as nc.exe,
rename the file as nc??.exe (?? =Hex C0 D7 BA DC)
Then these malicious files will be not detected by antivirus scan.
Because these special names are unable directly to input, so if you
want to run these file, you should use the following way:
[ROOT@D:\Vul\bugtrap]#dir /x
1998-01-03 14:37 59,392 NC294E~1.EXE nc??.exe
[ROOT@D:\Vul\bugtrap]#NC294E~1.EXE -help
[v1.10 NT]
connect to somewhere: nc [-options] hostname port[s] [ports] ...
listen for inbound: nc -l -p port [options] [hostname] [port]
options:
Uses the MS-DOS name specification, we can operate file with Open、
Read、Write、 and duplicate。
In fact the most vendor all have the problem in regarding this king
of file parse: For instance use the right key clicks these kinds of
file, will be no scan option menu to show by Kaspersky antivirus, and
Symantec AntiVirus Corporate V10.0.1.1000 will detected but can't remove
it. AVG Anti-Virus will be passed by normally path scan mothod, but
can't read the file if click the scan option menu.
3. Credits:
------------
Thank xundi@...cus.org translate it, thx all members of xfocus team
and all support xfocus team.
4. About xfocus:
------------
Xfocus is a non-profit and free technology organization which
was
founded in 1998 in China. We are devoting to research and demonstration
of weaknesses related to network services and communication security.
homepage http://www.xfocus.org/
-----EOF
--
Kind Regards,
---
alert7@...cus.org
XFOCUS Security Team
http://www.xfocus.org
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists