SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Norman Virus Control Vendors:   Norman
Norman Virus Control ACE and LZH Buffer Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1018438
SecurityTracker URL:  http://securitytracker.com/id/1018438
CVE Reference:   CVE-2007-3951, CVE-2007-3952, CVE-2007-3953   (Links to External Site)
Updated:  Apr 24 2008
Original Entry Date:  Jul 23 2007
Impact:   Denial of service via network, Execution of arbitrary code via network, Host/resource access via network, User access via network
Vendor Confirmed:  Yes  
Version(s): 5.90, possibly other versions
Description:   Several vulnerabilities were reported in Norman Virus Control. A remote user can execute arbitrary code on the target system. A remote user can bypass anti-virus detection. A remote user can cause denial of service conditions.

A remote user can send a specially crafted ACE or LZH file to trigger one of several buffer overflows and execute arbitrary code on the target system. The code will run with the privileges of the target application.

A remote user can send a specially crafted DOC file that will bypass detection.

A remote user can send a specially crafted DOC file that will cause the target application to crash.

The vendor was notified on May 7, 2007.

Sergio Alvarez of n.runs AG discovered this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can bypass anti-virus detection.

A remote user can cause the target application to crash.

Solution:   No solution was available at the time of this entry.
Vendor URL:  www.norman.com/ (Links to External Site)
Cause:   Boundary error, State error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  n.runs-SA-2007.021 - Norman Antivirus LZH parsing Arbitrary Code

n.runs AG                       
http://www.nruns.com/                              security(at)nruns.com
n.runs-SA-2007.021                                           23-Jul-2007
________________________________________________________________________

Vendor:                Norman, http://www.norman.com
Affected Products:     All Norman Antivirus Solutions
Vulnerability:         Arbitrary Code Execution (remote) 
Risk:                  CRITICAL

________________________________________________________________________

Vendor communication:

  2007/05/07        Initial notification to Norman together with our RFP 
  2007/05/08        Norman Responses asking for the PoC files
  2007/05/08        Request public PGP keys
  2007/05/08        PGP keys exchange
  2007/05/08        PoC files sent to Norman
  2007/05/08        Norman has PGP incompatible version problems
  2007/05/08        Norman requests n.runs to send the PoC files RAR'ed 
                    with password sent in in a separate mail
  2007/05/08        Send the PoC files RAR'ed with password.
  2007/05/08        Send the RAR'ed files password.
  2007/05/08        Norman validates the vulnerabilities and informs that 
                    the vulnerabilities will take long QA process because 
                    the update for this vulnerabilities will need system 
                    reboot.
  2007/05/09        n.runs thanks for the feedback and asks for an 
                    estimation of time to fix the vulnerabilities
  2007/05/23        Ping Norman for a replay
  2007/05/23        Norman replays that has forwarded the PoC files to 
                    their engine/unpacker programmers, but hasn't 
                    received any update as to how fast these can be fixed.
  2007/05/23        n.runs thanks Norman for the feedback and reminds to 
                    keep aligned with n.runs RFP (for the delay in the 
                    replay)
  2007/06/19        Ping to Norman for update on fix status and reminds 
                    that the communication have to be aligned with 
                    n.runs RFP
  2007/06/19        Norman replays that can't decrypt the last mail (the 
                    PING mail of the same date) and that has generated a 
                    new DH/DSS key to use.
  2007/06/19        Re-Send the Ping to Norman for status update 
                    encrypted with the new Norman's key
  2007/07/05        n.runs requests a replay to the ping In Clear Text 
                    including the before mentioned PING mails as the 
                    contents have no sensitive information.
  2007/07/05        Norman replays and acknowledges that has received the 
                    previous PING mail and adds the "Head of Engine 
                    Development Team" in the loop.
  2007/07/05        Norman's "Head of Engine Development Team" replays 
                    that The OLE2 issues should be resolved with the 
                    latest scanner engine (5.91.02) and that the 
                    decompression issues, the crash cases will be 
                    resolved soon, and he would expect an update to be 
                    available within the next month
  2007/07/05        n.runs thanks for the update information, also asks 
                    how the credits are going to be handled and reminds 
                    that the communication have to be aligned with 
                    n.runs RFP
  2007/07/10        Norman replays the following:

"Sergio,

We have discussed your mail.  It is not our company's policy 
to publish information about vulnerabilities or bugs in our 
software, unless they are extremely critical and/or can be 
worked around by the end-user.  There are usually a large 
number of vulnerabilities/bugs in any software, and in our 
opinion it would only serve to unsettle user confidence in the 
products if the industry continually feeds information about 
such weaknesses, and we don't see that it would give the user 
any benefit in return. 

Instead we feel that it should be the supplier's 
responsibility to correct any errors and weaknesses and have 
them released to the user fast and silently, without alerting 
also the malware industry.

Hence, there is no forum where we can credit you for your 
findings.

We sincerely appreciate that you notify us whenever you find a 
vulnerability in our software, as we appreciate such 
information from other sources.  These findings, in addition 
to bug reports, are continuously being reviewed with respect 
to seriousness and work involved in fixing the problems, and 
assigned priorities accordingly, but no estimated dates for 
fixing the issues are published.

This has always been - and presently is - our company's 
policy.  This policy may of course be revised by company 
management at any time, if deemed necessary or useful."

  2007/07/11        n.runs replays that when they request the PoC files 
                    they implicitly accepted n.runs RFP and that the last 
                    mail was violating n.runs RFP and request a soon 
                    replay, otherwise the advisories would have to be 
                    release uncoordinated.
  2007/07/23        Norman DID NOT replay
  2007/07/23        n.runs assumes that Norman finalized their 
                    communication with n.runs
  2007/07/23        Advisories release
________________________________________________________________________

Overview:
 
Norman ASA is a world leading company within the field of data security, 
internet protection and analysis tools. Through its SandBox technology 
Norman offers a unique and proactive protection unlike any other competitor. 

While focusing on its proactive antivirus technology, the company has formed 
alliances which enable Norman to offer a complete range of data security 
services. 

Norman was established in 1984 and is headquartered in Norway with 
continental Europe, UK and US as its main markets.

Description:

Multiple remotely exploitable vulnerabilities have been found in the file 
parsing engine.

In detail, the following flaw was determined:

- 3 (Three) Buffer Overflow through Integer Cast Around in .LZH file parsing

Impact:

These problems can lead to remote arbitrary code execution if an attacker 
carefully crafts a file that exploits any of the aforementioned 
vulnerabilities. The vulnerabilities are present in Norman Antivirus 
software since at least version 5.90.

Solution:

These vulnerabilities were reported on May 07 and may remain UNFIXED to 
the current date 23.Jul.2007.
________________________________________________________________________

Credit: 
Bugs found by Sergio Alvarez of n.runs AG. 
________________________________________________________________________

References: 

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
http://www.nruns.com/parsing-engines-advisories.php
________________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For all 
other reproduction or publication, in printing or otherwise, contact 
security@nruns.com for permission. Use of the advisory constitutes 
acceptance for use in an "as is" condition. All warranties are excluded. 
In no event shall n.runs be liable for any damages whatsoever including 
direct, indirect, incidental, consequential, loss of business profits or 
special damages, even if n.runs has been advised of the possibility of 
such damages. 

Copyright 2007 n.runs AG. All rights reserved. Terms of apply.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC