SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   avast! Vendors:   ALWIL Software
avast! antivirus Directory Traversal and Buffer Overflow in UNACEV2.DLL Lets Remote Users Write Files and Execute Arbitrary Code
SecurityTracker Alert ID:  1014544
SecurityTracker URL:  http://securitytracker.com/id/1014544
CVE Reference:   CVE-2005-2384, CVE-2005-2385   (Links to External Site)
Updated:  Jul 6 2008
Original Entry Date:  Jul 21 2005
Impact:   Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Home/Professional Edition prior to version 4.6.691, Server Edition prior to version 4.6.489, Managed Client prior to version 4.6.394
Description:   Some vulnerabilities were reported in avast! antivirus in the processing of ACE archives. A remote user can write files on the target system. A remote user can execute arbitrary code on the target system.

If ACE archive scanning is enabled, a remote user can create a specially crafted ACE archive that, when processed by the target user, will write files to arbitrary directories or trigger a buffer overflow and execute arbitrary code.

The 'UNACEV2.DLL' library does not properly validate filenames when extracting archives to scan them. A file with a filename containing directory traversal characters ('/../') or an absolute path may be written to an arbitrary location on the target system.

The library also contains a buffer overflow. A filename longer than 290 bytes can trigger the overflow.

Tan Chew Keong of Secunia Research discovered this vulnerability.

Impact:   A remote user can write files to arbitrary directories on the target system.

A remote user can execute arbitrary code on the target system.

Solution:   The vendor has issued fixed versions (Home/Professional Edition version 4.6.691, Server Edition version 4.6.489, Managed Client version 4.6.394).
Vendor URL:  www.avast.com/ (Links to External Site)
Cause:   Boundary error, Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC