CVE-2005-3382
CVSS5.0
发布时间 :2005-10-30 09:34:00
修订时间 :2016-10-17 23:35:02
NMCS    

[原文]Multiple interpretation error in Sophos 3.91 with the 2.28.4 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."


[CNNVD]Sophos魔法字节缺陷病毒检测绕过漏洞(CNNVD-200510-282)

        Sophos Anti-Virus 来自英国的欧洲防毒软件领导品牌。
        带2.28.4引擎的Sophos 3.91存在多个解释错误。远程攻击者可通过带有"MZ"魔法字节序列的BAT、HTML和EML等文件绕过病毒扫描。该序列通常与EXE关联,它会使该文件被视为安全类型,仍可由端系统上的应用程序作为危险文件类型来执行,比如由含有EXE、EML和HTML内容的"三头"程序执行,也称为"魔法字节缺陷"。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3382
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3382
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200510-282
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=113026417802703&w=2
(UNKNOWN)  BUGTRAQ  20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through
http://www.securityelf.org/magicbyte.html
(UNKNOWN)  MISC  http://www.securityelf.org/magicbyte.html
http://www.securityelf.org/magicbyteadv.html
(VENDOR_ADVISORY)  MISC  http://www.securityelf.org/magicbyteadv.html
http://www.securityelf.org/updmagic.html
(UNKNOWN)  MISC  http://www.securityelf.org/updmagic.html
http://www.securityfocus.com/bid/15189
(UNKNOWN)  BID  15189

- 漏洞信息

Sophos魔法字节缺陷病毒检测绕过漏洞
中危 其他
2005-10-30 00:00:00 2006-08-16 00:00:00
远程  
        Sophos Anti-Virus 来自英国的欧洲防毒软件领导品牌。
        带2.28.4引擎的Sophos 3.91存在多个解释错误。远程攻击者可通过带有"MZ"魔法字节序列的BAT、HTML和EML等文件绕过病毒扫描。该序列通常与EXE关联,它会使该文件被视为安全类型,仍可由端系统上的应用程序作为危险文件类型来执行,比如由含有EXE、EML和HTML内容的"三头"程序执行,也称为"魔法字节缺陷"。

- 公告与补丁

        暂无数据

- 漏洞信息

Multiple Vendor Anti-Virus Magic Byte Detection Evasion Vulnerability
Failure to Handle Exceptional Conditions 15189
Yes No
2005-10-25 12:00:00 2005-10-25 12:00:00
Wayne Langlois and Andrey Bayora are credited with the discovery of this vulnerability.

- 受影响的程序版本

Ukranian National Antivirus UNA
Trend Micro PC-cillin 2005
Trend Micro OfficeScan Corporate Edition 7.0
TheHacker TheHacker Antivirus 5.8.4 .128
Sophos Anti-Virus 3.91
Panda Titanium
Norman Virus Control 5.81
McAfee VirusScan Enterprise 8.0
McAfee Internet Security Suite 7.1.5
Kaspersky Labs Anti-Virus 5.0.372
Ikarus Ikarus 2.32
Frisk Software F-Prot Antivirus 3.16 c
Fortinet Antivirus 2.48 .0.0
eTrust eTrust CA 7.0.14
Dr.Web Dr.Web 4.32 b
Cat Computer Services Quick Heal Antivirus 8.0
AVG AVG Anti-Virus 7.0.323
ArcaBit ArcaVir 2005.0
VirusBlokAda VBA32
Trend Micro PC-cillin 2006
Symantec Norton Internet Security 2005 11.5.6 .14
Symantec AntiVirus Corporate Edition 10.0
Sophos Anti-Virus 5.0.2
Sophos Anti-Virus 3.95
Softwin BitDefender 8.0
NOD32 NOD32 2.50.25
H+BEDV AntiVir Personal 6.31 .00.01
F-Secure Anti-Virus 5.56
ClamWin ClamWin 0.86.1
Avast! Antivirus Home Edition 4.6.655

- 不受影响的程序版本

VirusBlokAda VBA32
Trend Micro PC-cillin 2006
Symantec Norton Internet Security 2005 11.5.6 .14
Symantec AntiVirus Corporate Edition 10.0
Sophos Anti-Virus 5.0.2
Sophos Anti-Virus 3.95
Softwin BitDefender 8.0
NOD32 NOD32 2.50.25
H+BEDV AntiVir Personal 6.31 .00.01
F-Secure Anti-Virus 5.56
ClamWin ClamWin 0.86.1
Avast! Antivirus Home Edition 4.6.655

- 漏洞讨论

Multiple vendor anti-virus software is prone to a detection evasion vulnerability.

The problem presents itself in the way various anti-virus software determines the type of file it is scanning.

An attacker can exploit this vulnerability to pass malicious files passed the anti-virus software. This results in a false sense of security, and ultimately could lead to the execution of arbitrary code on the victim user's machine.

- 漏洞利用

The discoverer of this issue has supplied the following proof of concept demonstrating this issue:
http://www.securityelf.org/magicbyte.html

- 解决方案

Trend Micro PC-cillin 2006 is not affected by this issue. Please contact the vendor to obtain fixes.

Kaspersky Labs states that a fix for all affected versions of Kaspersky Labs Anti-Virus was made available as of 11 November, 2005. This fix is available through the normal signature update functionality.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站