CVE-2004-0937
CVSS7.5
发布时间 :2005-02-09 00:00:00
修订时间 :2008-09-05 16:39:51
NMCP    

[原文]Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.


[CNNVD]多家防病毒厂商软件病毒探测绕过漏洞(CNNVD-200502-042)

        McAfee,Computer Associates, Kaspersky, Sophos, Eset and RAV是一些反病毒软件。
         多家防病毒厂商软件在处理.zip文件时存在问题,远程攻击者可以利用这个漏洞夹带恶意代码绕过反病毒软件的检查。
         问题存在于对.zip档头字段的解析,.zip文件格式存储压缩文件的信息分两个部分,一个是本地(local)头字段,一个是全局(global)头字段。本地头字段数据存在于压缩数据文件之前,而全局字段存在于.zip档最后。攻击者可以修改本地和全局头字段信息中归档文件未压缩字节大小值而不影响功能,但多家防病毒厂商软件对这样的档文件就不能很好的处理,如果在压缩负载中带有恶意代码,就不能被检测到。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:mandrakesoft:mandrake_linux:10.1MandrakeSoft Mandrake Linux 10.1
cpe:/a:ca:etrust_intrusion_detection:1.4.1.13Computer Associates eTrust Intrusion Detection 1.4.1.13
cpe:/a:ca:etrust_antivirus:7.1Computer Associates eTrust Antivirus 7.1
cpe:/a:sophos:sophos_anti-virus:3.78dSophos Sophos Anti-Virus 3.78d
cpe:/a:rav_antivirus:rav_antivirus_for_file_servers:1.0
cpe:/a:sophos:sophos_puremessage_anti-virus:4.6
cpe:/o:mandrakesoft:mandrake_linux:10.1::x86_64
cpe:/a:sophos:sophos_anti-virus:3.84Sophos Sophos Anti-Virus 3.84
cpe:/a:sophos:sophos_anti-virus:3.82Sophos Sophos Anti-Virus 3.82
cpe:/a:ca:etrust_antivirus_gateway:7.0Computer Associates eTrust Antivirus Gateway 7.0
cpe:/o:suse:suse_linux:9.2SuSE SuSE Linux 9.2
cpe:/a:sophos:sophos_anti-virus:3.78Sophos Sophos Anti-Virus 3.78
cpe:/a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2
cpe:/a:sophos:sophos_anti-virus:3.86Sophos Sophos Anti-Virus 3.86
cpe:/a:ca:etrust_secure_content_manager:1.1Computer Associates eTrust Secure Content Manager 1.1
cpe:/a:rav_antivirus:rav_antivirus_desktop:8.6
cpe:/a:sophos:sophos_anti-virus:3.4.6Sophos Sophos Anti-Virus 3.4.6
cpe:/a:sophos:sophos_anti-virus:3.83Sophos Sophos Anti-Virus 3.83
cpe:/o:gentoo:linuxGentoo Linux
cpe:/a:sophos:sophos_small_business_suite:1.0
cpe:/a:kaspersky_lab:kaspersky_anti-virus:4.0
cpe:/a:ca:etrust_ez_antivirus:6.3Computer Associates eTrust EZ Antivirus 6.3
cpe:/a:ca:etrust_ez_antivirus:6.2Computer Associates eTrust EZ Antivirus 6.2
cpe:/a:ca:etrust_ez_armor:2.0Computer Associates eTrust EZ Armor 2.0
cpe:/a:sophos:sophos_anti-virus:3.80Sophos Sophos Anti-Virus 3.80
cpe:/a:mcafee:antivirus_engine:4.3.20McAfee McAfee Antivirus Engine 4.3.20
cpe:/a:ca:etrust_antivirus_gateway:7.1Computer Associates etrust Antivirus Gateway 7.1
cpe:/a:archive_zip:archive_zip:1.13
cpe:/a:ca:etrust_antivirus:7.0_sp2
cpe:/a:ca:inoculateit:6.0Computer Associates InoculateIT 6.0
cpe:/a:eset_software:nod32_antivirus:1.0.11
cpe:/a:eset_software:nod32_antivirus:1.0.13
cpe:/a:eset_software:nod32_antivirus:1.0.12
cpe:/a:ca:etrust_intrusion_detection:1.4.5Computer Associates eTrust Intrusion Detection 1.4.5
cpe:/a:ca:etrust_secure_content_manager:1.0Computer Associates eTrust Secure Content Manager 1.0
cpe:/a:ca:etrust_ez_armor:2.3Computer Associates eTrust EZ Armor 2.3
cpe:/a:ca:etrust_ez_antivirus:6.1Computer Associates eTrust EZ Antivirus 6.1
cpe:/a:ca:etrust_ez_armor:2.4Computer Associates eTrust EZ Armor 2.4
cpe:/a:ca:etrust_intrusion_detection:1.5Computer Associates eTrust Intrusion Detection 1.5
cpe:/a:ca:etrust_antivirus:7.0Computer Associates eTrust Antivirus 7.0
cpe:/a:sophos:sophos_anti-virus:3.81Sophos Sophos Anti-Virus 3.81
cpe:/a:ca:brightstor_arcserve_backup:11.1Computer Associates BrightStor ARCserve Backup 11.1
cpe:/o:gentoo:linux:1.4Gentoo Linux 1.4
cpe:/a:sophos:sophos_anti-virus:3.85Sophos Sophos Anti-Virus 3.85
cpe:/a:kaspersky_lab:kaspersky_anti-virus:5.0
cpe:/a:ca:etrust_secure_content_manager:1.0:sp1
cpe:/a:kaspersky_lab:kaspersky_anti-virus:3.0
cpe:/a:sophos:sophos_anti-virus:3.79Sophos Sophos Anti-Virus 3.79

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0937
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0937
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200502-042
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/968818
(UNKNOWN)  CERT-VN  VU#968818
http://www.securityfocus.com/bid/11448
(VENDOR_ADVISORY)  BID  11448
http://xforce.iss.net/xforce/xfdb/17761
(VENDOR_ADVISORY)  XF  antivirus-zip-protection-bypass(17761)
http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true
(UNKNOWN)  IDEFENSE  20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability

- 漏洞信息

多家防病毒厂商软件病毒探测绕过漏洞
高危 设计错误
2005-02-09 00:00:00 2006-12-21 00:00:00
远程  
        McAfee,Computer Associates, Kaspersky, Sophos, Eset and RAV是一些反病毒软件。
         多家防病毒厂商软件在处理.zip文件时存在问题,远程攻击者可以利用这个漏洞夹带恶意代码绕过反病毒软件的检查。
         问题存在于对.zip档头字段的解析,.zip文件格式存储压缩文件的信息分两个部分,一个是本地(local)头字段,一个是全局(global)头字段。本地头字段数据存在于压缩数据文件之前,而全局字段存在于.zip档最后。攻击者可以修改本地和全局头字段信息中归档文件未压缩字节大小值而不影响功能,但多家防病毒厂商软件对这样的档文件就不能很好的处理,如果在压缩负载中带有恶意代码,就不能被检测到。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Home (Retail) Users:
        http://download.mcafee.com/uk/updates/updates.asp
        Business (Enterprise) Users:
        http://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1
        Computer Associates
        http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp

- 漏洞信息 (F35055)

zipbrk.zip (PacketStormID:F35055)
2004-11-20 00:00:00
oc.192  
exploit,local,virus
CVE-2004-0932,CVE-2004-0937
[点击下载]

This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站