SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Security)  >   Sophos Anti-Virus Vendors:   Sophos
Sophos Anti-Virus Can Be Hung With Specially Crafted MIME Headers
SecurityTracker Alert ID:  1009042
SecurityTracker URL:  http://securitytracker.com/id/1009042
CVE Reference:   CVE-2004-2075, CVE-2004-2088   (Links to External Site)
Updated:  Jun 24 2008
Original Entry Date:  Feb 13 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 3.78 (prior to 3.78d)
Description:   A vulnerability was reported in Sophos Anti-Virus. A remote user can send a specially crafted e-mail message to cause the anti-virus software to enter an infinite loop.

It is reported that a remote user can send an e-mail message that contains MIME headers that unexpectedly terminate at the end of the file to trigger the flaw.

Users of SAVI-compliant products, including PureMessage and MailMonitor, are reportedly affected.

The vendor also reported that a particular Delivery Status Notification (DSN) generated by qmail mail servers that contains the W32/MyDoom-A worm embedded in the body will pass through the Sophos Anti-Virus engine without being detected.

Impact:   A remote user can cause the anti-virus software to enter an infinite loop.

A remote user can send the MyDoom/A virus through the anti-virus software without being detected.

Solution:   The vendor has issued a fix in Sophos Anti-Virus version 3.78d:

* Windows NT/2000/XP/2003 (i386)

http://www.sophos.com/misc/angz.exe

* FreeBSD version 3+ on Intel (using ELF format)

http://www.sophos.com/misc/freebsd.elf.tar.Z

* Linux on Intel using libc6

http://www.sophos.com/misc/linux.intel.libc6.tar.Z

* Linux on Intel using libc6 (glibc 2.2)

http://www.sophos.com/misc/linux.intel.libc6.glibc.2.2.tar.Z

* Solaris on Sparc

http://www.sophos.com/misc/solaris.sparc.tar.Z

* AIX on PowerPC

http://www.sophos.com/misc/aix.tar.Z

* HP-UX on HP-PA

http://www.sophos.com/misc/hpux.tar.Z

The Enterprise Manager databank has reportedly been updated.

Vendor URL:  www.sophos.com/support/news/#mime-378 (Links to External Site)
Cause:   Exception handling error, State error
Underlying OS:   Linux (Any), UNIX (AIX), UNIX (FreeBSD), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Date:  Fri, 13 Feb 2004 15:47:42 -0500
Subject:  http://www.sophos.com/support/news/#mime-378


http://www.sophos.com/support/news/#mime-378

 > Advisory: Sophos Anti-Virus 3.78 MIME handling
 >
 > This article last updated: 12 February 2004

Sophos reported that Sophos Anti-Virus version 3.78 may enter an infinite loop when 
processing e-mail messages containing MIME headers that unexpectedly terminate at the end 
of the file.

Users of SAVI-compliant products, including PureMessage and MailMonitor, are reportedly 
affected.

The vendor also reported that a particular Delivery Status Notification (DSN) generated by 
qmail mail servers that contains the W32/MyDoom-A worm embedded in the body will pass 
through the Sophos Anti-Virus engine without being detected.

The vendor has issued a fix in Sophos Anti-Virus version 3.78d:

* Windows NT/2000/XP/2003 (i386)
http://www.sophos.com/misc/angz.exe

* FreeBSD version 3+ on Intel (using ELF format)
http://www.sophos.com/misc/freebsd.elf.tar.Z

* Linux on Intel using libc6
http://www.sophos.com/misc/linux.intel.libc6.tar.Z

* Linux on Intel using libc6 (glibc 2.2)
http://www.sophos.com/misc/linux.intel.libc6.glibc.2.2.tar.Z

* Solaris on Sparc
http://www.sophos.com/misc/solaris.sparc.tar.Z

* AIX on PowerPC
http://www.sophos.com/misc/aix.tar.Z

* HP-UX on HP-PA
http://www.sophos.com/misc/hpux.tar.Z


The Enterprise Manager databank has reportedly been updated.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC