[<prev] [next>] [day] [month] [year] [list]
Message-ID: <17b254f0812100351t5d1f15bbi8b922b60e1ee11b6@mail.gmail.com>
Date: Wed, 10 Dec 2008 17:21:28 +0530
From: "iViZ Security Advisories" <advisories@...zsecurity.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [IVIZ-08-012] Bitdefender antivirus for Linux multiple vulnerabilities
-----------------------------------------------------------------------
[ iViZ Security Advisory 08-012 10/12/2008 ]
-----------------------------------------------------------------------
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
-----------------------------------------------------------------------
* Title: Bitdefender antivirus for Linux multiple vulnerabilities.
* Date: 10/12/2008
* Software: Bitdefender v7 for Linux
--[ Synopsis:
Multiple integer overflows were discovered in the GNU/Linux
version of Bitdefender when analyzing corrupted PE binaries
packed with neolite and asprotect packers.
--[ Affected Software:
* Bitdefender for GNU/Linux version 7.60825 and earlier.
--[ Non Affected Software:
* Bitdefender for GNU/Linux version after v7.60825 and newer.
--[ Impact:
Remote DoS, possibly remote code execution.
--[ Final vendor response:
* The vendor acknowledged the problems and fixed them
in the latest versions of the product.
--[ Credits:
This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.
--[ Disclosure timeline:
* First private disclosure to vendor on September 19th 2008.
* First vendor reply on September 19th 2008 : Without asking for any PoC,
The BitDefender Support Team states that "This has been fixed in
latest version".
* September 19th 2008 : We manage to repeat crash with the updated
version of the scanner.
* September 19th 2008 : We send a PoC to the vendor.
* September 23th 2008 : Vendor states "Yes, the issue was reproduced
in the lab and it
seems that was an engine problem."
* September 24th 2008 : Problem fixed in latest version.
--[ Reference:
http://www.ivizsecurity.com/security-advisory.html
Powered by blists - more mailing lists