CVE-2006-0994
CVSS7.5
发布时间 :2006-05-10 06:02:00
修订时间 :2011-03-07 21:31:32
NMCOPS    

[原文]Multiple Sophos Anti-Virus products, including Anti-Virus for Windows 5.x before 5.2.1 and 4.x before 4.05, when cabinet file inspection is enabled, allows remote attackers to execute arbitrary code via a CAB file with "invalid folder count values," which leads to heap corruption.


[CNNVD]Sophos Anti-Virus CAB文件扫描 堆溢出漏洞(CNNVD-200605-186)

        Sophos Anti-Virus是一款适用于多种操作系统的杀毒软件。
        Sophos AntiVirus在解压CAB头中包含有无效文件夹计数值的Microsoft Cabinet文件时存在堆溢出漏洞。如果启用了cabinet文件检查的话,则扫描到上述文件就会导致代码执行。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sophos:sophos_anti-virus:4.04Sophos Sophos Anti-Virus 4.04
cpe:/a:sophos:sophos_anti-virus:5.2.0Sophos Sophos Anti-Virus 5.2.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0994
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0994
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-186
(官方数据源) CNNVD

- 其它链接及资源

http://www.zerodayinitiative.com/advisories/ZDI-06-012.html
(UNKNOWN)  MISC  http://www.zerodayinitiative.com/advisories/ZDI-06-012.html
http://www.vupen.com/english/advisories/2006/1730
(UNKNOWN)  VUPEN  ADV-2006-1730
http://www.securityfocus.com/bid/17876
(UNKNOWN)  BID  17876
http://www.securityfocus.com/archive/1/archive/1/433272/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060508 ZDI-06-012: Sophos Anti-Virus CAB Unpacking Code Execution Vulnerability
http://securitytracker.com/id?1016041
(UNKNOWN)  SECTRACK  1016041
http://secunia.com/advisories/20028
(VENDOR_ADVISORY)  SECUNIA  20028
http://xforce.iss.net/xforce/xfdb/26305
(UNKNOWN)  XF  sophos-cab-parsing-bo(26305)
http://securityreason.com/securityalert/869
(UNKNOWN)  SREASON  869
http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045897.html
(UNKNOWN)  FULLDISC  20060508 ZDI-06-012: Sophos Anti-Virus CAB Unpacking Code Execution Vulnerability

- 漏洞信息

Sophos Anti-Virus CAB文件扫描 堆溢出漏洞
高危 边界条件错误
2006-05-10 00:00:00 2009-01-29 00:00:00
远程  
        Sophos Anti-Virus是一款适用于多种操作系统的杀毒软件。
        Sophos AntiVirus在解压CAB头中包含有无效文件夹计数值的Microsoft Cabinet文件时存在堆溢出漏洞。如果启用了cabinet文件检查的话,则扫描到上述文件就会导致代码执行。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.sophos.com/support/knowledgebase/article/4934.html

- 漏洞信息 (F46314)

Zero Day Initiative Advisory 06-012 (PacketStormID:F46314)
2006-05-17 00:00:00
Tipping Point  zerodayinitiative.com
advisory,remote,arbitrary
CVE-2006-0994
[点击下载]

ZDI-06-012 - A vulnerability in Sophos AntiVirus, PureMessage, and MailMonitor allows remote attackers to execute arbitrary code. Authentication is not required to exploit this vulnerability.

ZDI-06-012: Sophos Anti-Virus CAB Unpacking Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-013.html
May  8, 2006

-- CVE ID:
CVE-2006-0994

-- Affected Vendor:
Sophos Plc.

-- Affected Products:
Sophos Anti-Virus for Windows, Mac OS, Unix, Linux, NetWare, OS/2, OpenVMS 
and DOS
Sophos Anti-Virus Small Business Editions for Windows and Mac OS
PureMessage for Windows/Exchange and UNIX
PureMessage Small Business Edition
MailMonitor for Windows, Notes/Domino and Exchange

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since March 14, 2006 by Digital Vaccine protection
filter IDs 4185, 4189. For further product information on the TippingPoint 
IPS:

    http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Sophos AntiVirus. Authentication is not
required to exploit this vulnerability.

The specific flaw exists within the unpacking of Microsoft Cabinet
files that contain invalid folder count values within the CAB header.
Parsing of a specially crafted cabinet file can lead to an exploitable
heap corruption. This vulnerability is only exposed when cabinet file
inspection is explicitly enabled.

-- Vendor Response:
Sophos has addressed this issue in the latest versions of their virus
protection software. Further details are available at:

http://www.sophos.com/support/knowledgebase/article/4934.html

-- Disclosure Timeline:
2006.03.14 - Digital Vaccine released to TippingPoint customers
2006.03.20 - Vulnerability reported to vendor
2006.05.08 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by an anonymous researcher.

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, a division of 3Com, The Zero Day Initiative
(ZDI) represents a best-of-breed model for rewarding security
researchers for responsibly disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

    http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is used.
3Com does not re-sell the vulnerability details or any exploit code.
Instead, upon notifying the affected product vendor, 3Com provides its
customers with zero day protection through its intrusion prevention
technology. Explicit details regarding the specifics of the
vulnerability are not exposed to any parties until an official vendor
patch is publicly available. Furthermore, with the altruistic aim of
helping to secure a broader user base, 3Com provides this vulnerability
information confidentially to security vendors (including competitors)
who have a vulnerability protection or mitigation product.
    

- 漏洞信息

25454
Sophos Anti-Virus Cabinet File Folder Count Memory Corruption
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Private Vendor Verified, Coordinated Disclosure

- 漏洞描述

- 时间线

2006-05-08 Unknow
Unknow 2006-05-10

- 解决方案

An upgrade is required. Refer to the vendor advisory for appropriate version numbers.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Sophos Anti-Virus CAB File Scanning Remote Heap Overflow Vulnerability
Boundary Condition Error 17876
Yes No
2006-05-08 12:00:00 2006-05-08 11:54:00
The original discoverer of this issue wishes to remain anonymous.

- 受影响的程序版本

Sophos PureMessage Small Business Edition 4.04
Sophos PureMessage for Windows/Exchange 5.2
Sophos PureMessage for UNIX 4.04
Sophos MailMonitor for SMTP 2.1
Sophos MailMonitor for SMTP 2.0
Sophos MailMonitor for SMTP 4.04
Sophos MailMonitor for Notes/Domino 4.04
Sophos MailMonitor for Notes/Domino
Sophos MailMonitor for Exchange 4.04
Sophos Anti-Virus Small Business Edition 4.04
Sophos Anti-Virus 5.2
Sophos Anti-Virus 4.7.1
Sophos Anti-Virus 4.5.11
Sophos Anti-Virus 3.96 .0
Sophos Anti-Virus 3.95
Sophos Anti-Virus 3.91
Sophos Anti-Virus 3.90
Sophos Anti-Virus 3.86
Sophos Anti-Virus 3.85
Sophos Anti-Virus 3.84
Sophos Anti-Virus 3.83
Sophos Anti-Virus 3.82
Sophos Anti-Virus 3.81
Sophos Anti-Virus 3.80
Sophos Anti-Virus 3.79
Sophos Anti-Virus 3.78 d
Sophos Anti-Virus 3.78
Sophos Anti-Virus 3.4.6
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Sophos Anti-Virus 4.04
Sophos PureMessage Small Business Edition 4.05
Sophos PureMessage for Windows/Exchange 5.2.1
Sophos PureMessage for UNIX 4.05
Sophos MailMonitor for SMTP 4.05
Sophos MailMonitor for Notes/Domino 4.05
Sophos MailMonitor for Exchange 4.05
Sophos Anti-Virus Small Business Edition 4.05
Sophos Anti-Virus 5.2.1
Sophos Anti-Virus 4.7.2
Sophos Anti-Virus 4.5.12
Sophos Anti-Virus 4.05

- 不受影响的程序版本

Sophos PureMessage Small Business Edition 4.05
Sophos PureMessage for Windows/Exchange 5.2.1
Sophos PureMessage for UNIX 4.05
Sophos MailMonitor for SMTP 4.05
Sophos MailMonitor for Notes/Domino 4.05
Sophos MailMonitor for Exchange 4.05
Sophos Anti-Virus Small Business Edition 4.05
Sophos Anti-Virus 5.2.1
Sophos Anti-Virus 4.7.2
Sophos Anti-Virus 4.5.12
Sophos Anti-Virus 4.05

- 漏洞讨论

A remote heap-overflow vulnerability exists in Sophos Anti-Virus Library when scanning CAB files. This issue is due to the library's failure to properly bounds-check user-supplied input before copying data to an internal memory buffer.

Successfully exploiting this vulnerability could result in arbitrary code execution with the privileges of the application.

- 漏洞利用


Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

The vendor has released an advisory along with fixes to address this issue.

Please see the referenced advisory for further information. Please contact the vendor for details on obtaining fixes.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站