OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
[SA16604] NOD32 Anti-Virus ARJ Archive Handling Buffer Overflow

From: Secunia Security Advisories (sec-advsecunia.com)
Date: Thu Sep 08 2005 - 05:38:43 CDT


----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
NOD32 Anti-Virus ARJ Archive Handling Buffer Overflow

SECUNIA ADVISORY ID:
SA16604

VERIFY ADVISORY:
http://secunia.com/advisories/16604/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
From remote

SOFTWARE:
NOD32 for Windows NT/2000/XP 2.x
http://secunia.com/product/1066/

DESCRIPTION:
Secunia research has discovered a vulnerability in NOD32 Anti-Virus,
which potentially can be exploited by malicious people to compromise
a vulnerable system.

The vulnerability is caused due to an error in handling ARJ archives
containing compressed files with overly long filename. This can be
exploited to cause a heap-based buffer overflow when a specially
crafted ARJ archive is scanned.

Successful exploitation may allow arbitrary code execution, but
requires that archive scanning is enabled.

The vulnerability has been confirmed in NOD32 for Windows
NT/2000/2003/XP Trial Version 2.5 (with nod32.002 version 1.033 build
1127). Other versions may also be affected.

SOLUTION:
Update to the latest version (nod32.002 version 1.034 build 1132) via
online update.

PROVIDED AND/OR DISCOVERED BY:
Tan Chew Keong, Secunia Research.

ORIGINAL ADVISORY:
Secunia Research:
http://secunia.com/secunia_research/2005-40/advisory/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories

----------------------------------------------------------------------