[<prev] [next>] [day] [month] [year] [list]
Message-ID: <10110326423.20090614205055@Zoller.lu>
Date: Sun, 14 Jun 2009 20:50:55 +0200
From: Thierry Zoller <Thierry@...ler.lu>
To: bugtraq <bugtraq@...urityfocus.com>, info@...cl.etat.lu,
vuln@...unia.com, <cert@...t.org>, <nvd@...t.gov>, <cve@...re.org>,
<full-disclosure@...ts.grok.org.uk>
Subject: [TZO-32-2009] Norman generic bypass (RAR)
________________________________________________________________________
From the low-hanging-fruit-department
Norman generic evasion (RAR)
________________________________________________________________________
CHEAP Plug :
************
You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed
************
Release mode: Coordinated but limited disclosure.
Ref : [TZO-32-2009] - Norman generic evasion (RAR)
WWW : http://blog.zoller.lu/2009/06/advisory-norman-generic-evasion-rar.html
Vendor : http://www.norman.com
Status : Patched (with decompression engine version 5.99.07)
CVE : none provided
Credit : http://www.norman.com/support/security_bulletins/69333/en
OSVDB vendor entry: Norman is not listed as a vendor in OSVDB
Security notification reaction rating : ok
Notification to patch window : 77 days
Disclosure Policy : http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html
Affected products :
The vulnerabilities have been fixed in Norman's compression library (NCL) 5.99.07,
relased on Norman's Internet update servers as an automatic update 03 June 2009.
This solves the vulnerability for all updated Norman's products except for
Norman Network Protection
- Norman Virus Control single user and corporate versions
- Norman Internet Control
- Norman Virus Control E-mail plugins
- Norman Endpoint Protection
- Norman Secuirty Suite
- Norman Network Protection
- Norman Virus Control for Lotus Domino
- Norman Virus Control for Exchange
- Norman Virus Control for Linux
- Norman Virus Control for Novell Netware (FireBreak)
- Norman Email Protection
- Norman Email Protection Appliance
- Norman Online Protection
- Norman Virus Control for AMaViS
- Norman Virus Control for MIMEsweeper
- Third party vendors that use the Engine
OEM vendors known to use the Norman engine :
- eeye
I. Background
~~~~~~~~~~~~~
Quote: "Norman ASA is a world leading company within the field of data security,
internet protection and analysis tools. Through its SandBox technology
Norman offers a unique and proactive protection unlike any other
competitor"
II. Description
~~~~~~~~~~~~~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html
The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all.
III. Impact
~~~~~~~~~~~
The bug results in denying the engine the possibility to inspect
code within the RAR archives. There is no inspection of content
at all.
A general description of the impact and nature of AV Bypasses/evasions
can be read at : http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html
IV. Disclosure time-line
~~~~~~~~~~~~~~~~~~~~~~~~~
DD/MM/YYYY
05/03/2009 : Send proof of concept (RAR Size), description the terms under which
I cooperate and the planned disclosure date.
No reply
13/03/2009 : Re-Send proof of concept (RAR Size), indicating this is the last attempt
to responsible disclose.
14/03/2009 : Norman acknowledges receipt
23/03/2009 : Send proof of concept (RAR Method)
23/03/2009 : Asking for an update for the RAR Size sample
02/04/2009 : Norman confirms reproduction of RAR Method PoC and that they will release
the patch a.s.a.p
02/04/2009 : Norman promises to get back with release dates/advisory information as soon
as they have some firm dates
06/04/2009 : Norman confirms reproduction of RAR Headflags PoC
20/04/2009 : Norman confirms reproduction of the CAB PoC and that all reported
vulnerabilities have been patched internaly.
22/04/2009 : Ask for a list of affected versions/products
no answer
27/04/2009 : Norman sends in the patched decompression DLL for me to if the patch
is correct.
28/04/2009 : Send TAR PoC file
no acknowledgement
07/05/2009 : Ask for an update to all reported bugs
no reply
08/05/2009 : Inform Norman that as I no longer receive any replies I assume that
the patch is deployed and set that the final disclosure date to
the 1.06.2009
09/05/2009 : Norman states they probably can't make the 1/06/2009
09/05/2009 : Propose to postpone disclosure upon request
28/05/2009 : Ask for an update as 01.06.2009 still is set
30/05/2009 : Norman asks to postpone the disclosure by a week as they
have to finish Q&A
09/06/2009 : Ask norman whether the Q&A has been finished
09/06/2009 : Norman replies the patches where deployed on the 3rd
of June.
10/06/2009 : Release of this advisory.
Powered by blists - more mailing lists