SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   NOD32 Vendors:   Eset
NOD32 for UNIX Buffer Overflow May Let Local Users Gain Root Privileges
SecurityTracker Alert ID:  1006072
SecurityTracker URL:  http://securitytracker.com/id/1006072
CVE Reference:   CVE-2003-0062   (Links to External Site)
Date:  Feb 10 2003
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.012 and prior versions
Description:   A buffer overflow was reported in Eset's NOD32 for UNIX anti-virus software. A local user could gain root privileges.

iDEFENSE reported that a local user can create a path name that is longer than 500 characters. When NOD32 for UNIX scans this path, the overflow will be triggered. This reportedly allows the local user to overwrite portions of the EAX and ECX registers, causing arbitrary code to be executed with the privileges of the scanning process (according to the report, this is typically the root user).

A demonstration exploit is provided in the Source Message.

Impact:   A local user may be able to gain root privileges.
Solution:   The vendor has released a fixed version (1.013), available at:

http://www.nod32.com/download/download.htm

Vendor URL:  www.nod32.com/products/unix.htm (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (FreeBSD), UNIX (NetBSD), UNIX (OpenBSD)

Message History:   None.


 Source Message Contents

Subject:  iDEFENSE Security Advisory 02.10.03: Buffer Overflow In NOD32 Antivirus Software for Unix


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 02.10.03:
http://www.idefense.com/advisory/02.10.03.txt
Buffer Overflow In NOD32 Antivirus Software for Unix
February 10, 2003

I. BACKGROUND

Eset Software's NOD32 Antivirus System is a cross-platform anti-virus
application.  The Linux, FreeBSD, OpenBSD and NetBSD versions are compiled
from the same sources, which the vendor refers to as "nod32 for UNIX". 
More information is available at http://www.nod32.com/products/unix.htm .


II. DESCRIPTION

Local exploitation of a buffer overflow in NOD32 for UNIX could allow
attackers to gain super-user (root) privileges. The overflow occurs when
NOD32 parses a path with a name of length greater than 500 characters
(/tmp/AAAAA....AAA). An attacker can overwrite the first three bytes of
the eax and ecx registers, as can be seen from the following GDB output:

...
Program received signal SIGSEGV, Segmentation fault.
0x4207fa78 in strcmp () from /lib/i686/libc.so.6
(gdb) bt
#0 0x4207fa78 in strcmp () from /lib/i686/libc.so.6
#1 0x0804c2ba in scan_dir ()
#2 0x41414141 in ?? ()
Cannot access memory at address 0x41414141
(gdb) info registers
eax 0x4141414c 1094795596
ecx 0x4141414c 1094795596
... 


III. ANALYSIS

Exploitation allows local code execution with the privileges of the user
who spawned NOD32. This is possible by creating an exploit path and then
socially engineering a target user into scanning over the exploit path
using NOD32. If the attacker has write permissions to a directory that is
routinely scanned with NOD32 (such as /tmp), he or she can gain the
privileges of the scanning user (usually root).

Proof of concept exploit code has been written for the FreeBSD 4.7
platform. The following is a sample exploit run that should set up shell
code in an environment variable and spawn a shell under the privileges of
the user executing NOD32:

$ perl eggnod.pl
$ mkdir -p /tmp/`perl -e 'print "A" x 255'`/`perl -e 'print "B" x 240 .
"\xfc\xbf\xbf"'`
$ nod32 /tmp

IV. DETECTION

NOD32 Antivirus System for Unix version 1.012 and below is vulnerable. 

V. VENDOR FIX

The latest version 1.013 fixes the issue and can be downloaded from
http://www.nod32.com

VI. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2003-0062 to this issue.

VII. DISCLOSURE TIMELINE

12/03/2003	Issue disclosed to iDEFENSE
01/28/2003	Eset Software notified (webmaster@nod32.com)
01/28/2003	iDEFENSE clients notified
02/03/2003	Response received from Palo Luka (luka@eset.sk)
02/10/2003	Coordinated Public Disclosure

VIII. CREDIT



Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to listserv@idefense.com, subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide 
decision-makers, frontline security professionals and network 
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com .

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPkgBffrkky7kqW5PEQIq/gCeMsnn0gKxpM25GI/QO673cEV7iAsAn15C
d5dxClPtqnk53TP0W2dmIJKS
=Smty
-----END PGP SIGNATURE-----


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC