SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Panda Antivirus Vendors:   Panda Software
Panda Antivirus Heap Overflow in Processing ZOO Archives May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015295
SecurityTracker URL:  http://securitytracker.com/id/1015295
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 30 2005
Impact:   Execution of arbitrary code via network, User access via network


Description:   A vulnerability was reported in Panda Antivirus in the processing of ZOO archives. A remote user may be able to execute arbitrary code on the target system.

Several Panda products and other 3rd party products that use the antivirus library may be affected.

The library does not properly validate user-supplied parameters from a compressed ZOO archive when attempting to decompress the file. A remote user can create a specially crafted file that, when processed using the library, will trigger a heap overflow and execute arbitrary code.

This may occur without human interaction in the case of mail servers and other automated content inspection services.

The flaw resides in 'pskcmp.dll'

The original advisory is available at:

http://www.rem0te.com/public/images/panda.pdf

Alex Wheeler discovered this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.pandasoftware.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-disclosure] Panda Remote Heap Overflow

Date
November 29, 2005

Vulnerability
The Panda Antivirus Library provides file format support for virus analysis. During decompression of ZOO files Panda is vulnerable
 to a heap overflow allowing attackers complete control of the system(s) being protected. This vulnerability can be exploited remotely
 without user interaction in default configurations through common protocols such as SMTP. 

Impact
Successful exploitation of Panda protected systems allows attackers unauthorized control of data and related privileges. It also provides
 leverage for further network compromise. Panda implementations are likely vulnerable in their default configuration.

Affected Products
Due to the library’s modular design and core functionality: it is likely this vulnerability affects a substantial portion of Panda’s
 gateway, server, and client antivirus enabled product lines on most platforms. 

http://www.pandasoftware.com/

Note: this library is also licensed to other venders with implementations that are likely affected, refer to Panda for specifics.

Details
http://www.rem0te.com/public/images/panda.pdf

Credit
This vulnerability was discovered and researched by Alex Wheeler.

Contact
security@rem0te.com




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC