lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <!&!AAAAAAAAAAAYAAAAAAAAAEqlc0sEqCZMjFiSy1tj+RPCgAAAEAAAAN5VdSBOH1JKo65WFIynWOwBAAAAAA==@nruns.com>
Date: Wed, 30 May 2007 22:27:42 +0200
From: <security@...ns.com>
To: <full-disclosure@...ts.grok.org.uk>,
	"'BugTraq'" <bugtraq@...urityfocus.com>
Subject: n.runs-SA-2007.012 - Avira Antivir Antivirus TAR Denial of Service

n.runs AG					   
http://www.nruns.com/			               security(at)nruns.com
n.runs-SA-2007.012                                           30-May-2007
________________________________________________________________________

Vendor:	           Avira GmbH, http://www.avira.com
Affected Product:      Avira Antivir Antivirus
Vulnerability:         Infinity Loop DoS (remote) 
Risk:                  HIGH
________________________________________________________________________

Vendor communication:

  2007/05/07		initial notification to Avira GmbH
  2007/05/07		Avira GmbH Response
  2007/05/08		PGP public keys exchange
  2007/05/09		PoC files sent to Avira GmbH
  2007/05/10		Avira GmbH acknowledged and validated the PoC files
  2007/05/16		Avira GmbH sent fix release schedule and fixed
engine
  2007/05/17		Sergio Alvarez tested fixed engine
  2007/05/23		Avira GmbH released Update with fixes
________________________________________________________________________

Overview:
 
Avira,  a company  with over  15 millions  customers and  more than  250
employees   is  a   worldwide    leading   supplier    of  self-developed
security  solutions  for professional and private use. With more than  20
years of experience, the company is  one of the pioneers in  this  field.
In addition to  programs  specifically for  use on single   workstations,
Avira  primarily    offers  professional   solutions   for   cross-system
protection of  networks on  various  levels. These include   products for
workstations,  file, mail  and  web  servers. Gateway  computers can   be
managed as workstation  computers via  a central  management console  for
all  operating systems. In  addition to  the management  products of  the
individual  solutions,  security  programs  for  PDAs,  smartphones   and
embedded  devices  are also   offered.  Avira AntiVir  Personal,  used by
millions  of  private  users, represents  a  significant  contribution to
security.

Description:

A remotely exploitable vulnerability has been found in the file parsing 
engine.

In detail, the following flaw was determined:

- Infinite Loop in .TAR files parsing


Impact:
This problem can lead to remote  denial of service provoked by high   CPU
consume  and exhaustion  of storage  resource if   an attacker  carefully
crafts  a  file   that  exploits  the  aforementioned  vulnerability. The
vulnerability is  present in  Avira Antivir  Antivirus software  versions
prior to the update Version 7.03.00.09. 

Solution: 
The vulnerability  was reported  on 07.May.2007   and an  update has been
issued  on 23.May.2007  to solve this  vulnerability through the  regular
update mechanism.
________________________________________________________________________

Credit: 
Bugs found by Sergio Alvarez of n.runs AG. 
________________________________________________________________________

References: 
http://forum.antivir-pe.de/thread.php?threadid=22528

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
________________________________________________________________________

Unaltered electronic reproduction of this  advisory is permitted. For all
other   reproduction      or     publication,      in     printing     or
otherwise,     contact security@...ns.com  for  permission.  Use  of  the
advisory constitutes  acceptance for  use in  an "as  is" condition.  All
warranties are excluded. In no event  shall n.runs  be  liable  for   any
damages    whatsoever    including    direct,    indirect,    incidental,
consequential,  loss of  business profits  or special  damages, even   if
n.runs has been advised of the possibility of such damages. 

Copyright 2007 n.runs AG. All rights reserved. Terms of apply.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ