Multiple AV vendor vulns - archived

AV front-and-center...

FYI...

- http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/
7th May 2010 - "... the technique might be combined with an exploit of another piece of software, say, a vulnerable version of Adobe Reader or Oracle's Java Virtual Machine to install malware without arousing the suspicion of the any AV software the victim was using. "Realistic scenario: someone uses McAfee or another affected product to secure their desktops," H D Moore, CSO and Chief Architect of the Metasploit project, told The Register in an instant message. "A malware developer abuses this race condition to bypass the system call hooks, allowing the malware to install itself and remove McAfee. In that case, all of the 'protection' offered by the product is basically moot." A user without administrative rights could also use the attack to kill an installed and running AV..."
- http://www.matousec.com/info/articl...ity-software.php#table-of-vulnerable-software
Published: 2010/05/05
Last update: 2010/05/07 - paragraph about which platforms are affected added to Final observations and notes...

- http://www.f-secure.com/weblog/archives/00001949.html
May 10, 2010 - "... this attack does not "break" all antivirus systems forever. Far from it. First of all, any malware that we detect by our antivirus will still be blocked, just like it always was. So the issue only affects new, unknown malware that we do not have signature detection for... We believe our multi-layer approach will provide sufficient protection level even if malicious code were to attempt use of Matousec's technique. And if we would see such an attack, we would simply add signature detection for it, stopping it in its tracks. We haven't seen any attacks using this technique in the wild. In a nutshell: We believe in defense in depth."

- http://www.darkreading.com/blog/archives/2010/05/is_khobe_an_ear.html
May 11, 2010 Graham Cluley, Sophos - "... describes a way in which the tamper protection implemented by some anti-malware products might be potentially bypassed. That's assuming, of course, you can get your malicious code past the anti-malware product in the first place. Hang on a minute. That means KHOBE is not really a way that hackers can avoid detection and get their malware installed on your computer. What Matousec is describing is a way of "doing something extra" if the malicious code manages to get past your antivirus software in the first place. In other words, KHOBE is only an issue if antivirus products miss the malware. And that's one of the reasons, of course, why vendors offer a layered approach using a variety of protection technologies..."

:fear:
 
Last edited:
Symantec - false positive - W.o.W...

FYI...

Symantec - false positive - W.o.W....
- http://forums.wow-europe.com/thread.html?topicId=13525762488&sid=1
* 14. Re: Infostealer in scan.dll and scan.dll.new 15/05/2010 03:20:48 PDT
"Looks like Norton is giving a false positive* ... "
* http://www.virustotal.com/analisis/...b3ca3bd70e2d605f25ea3fecc7967c3b5e-1273917649
File Scan.dll received on 2010.05.15 10:00:49 (UTC)
Result: 1/40 (2.50%)

- http://www.theregister.co.uk/2010/05/17/symantec_wow_false_alarm/

- http://isc.sans.org/diary.html?storyid=8803

:scratch:
 
Last edited:
AV detection evasion...

FYI...

AV detection evasion...
- http://isc.sans.org/diary.html?storyid=8857
Last Updated: 2010-05-26 05:41:55 UTC - "... Authors of malware often build various modules that allow them to extend functionality of malware but also to make analysis more difficult. The rationale behind this is pretty simple – if this particular infected machine does not need the module that, for example, attacks a certain bank it will not be downloaded and installed. This makes it more difficult for the AV vendors to collect all samples of various modules as the attackers can target them. One example of such highly modular (and heavily protected) malware is certainly Clampi – you can see a series of articles about this malware family posted on Symantec's web site*. The attackers can also use modularization to rapidly change fingerprints of malware – if only one module is detected by an AV vendor, the attacker only has to modify that particular module... One very simple malicious file was submitted to us couple of days... found the file in the /Windows/SysWOW64 directory on his Windows 7 machine. The file was named netset.exe and it wasn't signed, so it immediately looked suspicious... However, online malware scanners all happily declared the file safe – when it was initially submitted to VirusTotal it resulted in 0 detections (yes – 0 out of 40 AV programs on VirusTotal, see the report here**)... attackers are using those simple tricks to make automated analysis more difficult. Since even emulators such as Anubis, which execute the malware in an isolated environment, will not know which argument it needs, the file will appear to be benign. And judging by the VirusTotal results they have no problems with evading signature based scanning..."

* http://www.symantec.com/connect/blogs/inside-jaws-trojanclampi

** http://www.virustotal.com/analisis/...e16c44d8de81156fb4bb2cc602289aac7c-1272595124
File netset.exe received on 2010.04.30 02:38:44 (UTC)
Result: 0/40 (0.00%)
There is a more up-to-date report (30/43) for this file.
- http://www.virustotal.com/file-scan...e16c44d8de81156fb4bb2cc602289aac7c-1291654154
File name: netset.exe
Submission date: 2010-12-06 16:49:14 (UTC)
Result: 30/43 (69.8%)

:fear:
 
Last edited:
AV struggles against exploits

FYI...

AV struggles against exploits
- http://krebsonsecurity.com/2010/08/anti-virus-products-struggle-against-exploits/
August 23, 2010 - "... a series of reports released earlier this month by anti-virus testing lab AV-Test* comes to similar conclusions as NSS report about the exploit-blocking abilities of the major anti-virus products. According to AV-Test, the industry average in protecting against exploits (both known and unknown) was 75 percent."

* http://www.av-test.org/certifications
AV-Test Product Review and Certification Report - 2010/Q3

(More detail available at both URLs above.)

:fear:
 
Last edited:
avast! Antivirus v5.0.677 released

FYI...

avast! Antivirus v5.0.677 released
- http://secunia.com/advisories/41109/
Last Update: 2010-09-13
Impact: System access
Where: From remote
... The vulnerability is confirmed in avast! Free Antivirus version 5.0.594 for Windows. Other versions may also be affected.
Solution: Update to version 5.0.677 ...
Original Advisory: Avast!:

http://www.avast.com/en-eu/release-history
Version 5.1.889
2011-01-13

- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3126
Last revised: 08/26/2010
CVSS v2 Base Score: 9.3 (HIGH)

:fear::fear:
 
Last edited:
ClamAV v0.96.3 released

FYI...

ClamAV v0.96.3 released
- http://secunia.com/advisories/41503/
Release Date: 2010-09-21
Criticality level: Moderately critical
Impact: DoS, System access
Where: From remote
CVE Reference: CVE-2010-0405
Solution: Update to version 0.96.3.

- http://www.clamav.net/lang/en/download/sources/

- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3434
Last revised: 10/01/2010
CVSS v2 Base Score: 9.3 (HIGH)
___

- http://www.h-online.com/security/ne...-most-of-Windows-into-quarantine-1139430.html
19 November 2010

:fear:
 
Last edited:
Sophos/Mac AV - Top malware seen

FYI...

Sophos/Mac AV - Top malware seen
- http://sophosnews.files.wordpress.com/2010/11/top-malware-reported-mac.jpg?w=640
Nov. 2 - Nov. 16, 2010 [150K users]

> http://www.sophos.com/freemacav

- http://nakedsecurity.sophos.com/201...000-active-users-and-plenty-of-malware-found/
November 18, 2010 - "... 50,000 malware reports from the Mac users during the time period... We don't see as much Mac malware as Windows malware... unfortunately, so long as Mac users don't properly defend themselves they will increasingly be perceived as a soft target by cybercriminals..."

:sad:
 
McAfee SB10013 ...

FYI...

McAfee SB10013...
- http://isc.sans.edu/diary.html?storyid=10012
Last Updated: 2010-12-01 15:55:08 UTC - "McAfee Released Security Bulletin SB10013 this morning. The bulletin pertains to a potential code execution vulnerability for VirusScan Enterprise 8.5i and earlier versions. According to the information from McAfee they are investigating the publicly disclosed security issue and will publish a hotfix as soon as the investigation is complete. They have listed this as a Severity Rating of Medium. For more information and to check for the hotfix* ..."
* https://kc.mcafee.com/corporate/index?page=content&id=SB10013
December 01, 2010 - "... McAfee is aware of a publicly disclosed security issue that may affect VirusScan Enterprise version 8.5 and prior. We are investigating the claims and will update this KB with additional details when they are available. We will be publishing a hotfix for this issue as soon as we are certain the fix closes all avenues of attack. This hotfix will mitigate the issue in affected configurations. .. VSE 8.7i and beyond are not affected by this issue and are readily available immediately. Upgrading to the newest version effectively closes this issue completely... Remediation: Upgrade to or install VSE 8.7..."

- http://secunia.com/advisories/41482/
Release Date: 2010-11-29
Last Update: 2010-12-03
Criticality level: Highly critical
Impact: System access
Where: From remote
...The vulnerability is confirmed in version 8.5.0i (patch 8, 32bit scanmodule version 5400.1158, DAT version 6107.0000). Other versions may also be affected.
Solution: Fixed in McAfee VirusScan version 8.7i or later...

- https://kc.mcafee.com/corporate/index?page=content&id=SB10013
Last Modified: December 14, 2010

:fear:
 
Last edited:
AVG bad update bricks Win7 64-bit

FYI...

AVG bad update bricks Win7 64-bit
- http://isc.sans.edu/diary.html?storyid=10030
Last Updated: 2010-12-03 04:24:55 UTC - "... reports on AVG updates breaking things on Windows 7 64 bit... The problem lies with the mandatory update. The AVG site has some info on how to deal with the issue here http://forums.avg.com/ww-en/avg-free-forum?sec=thread&act=show&id=94159
* Basically get the machine started somehow (use AVG rescue Disk or any Linux Live CD). In the windows/system32/drivers directory rename everything starting with avg. Reboot and your system will be back (minus the AV). I guess it will then be a matter of waiting for it to be fixed, reinstall or change to something else."
___

AVG fix for computers running on Windows 7 64-bit platform - updated
- http://product-team.blog.avg.com/20...ers-running-on-windows-7-64-bit-platform.html
12/02/2010 - "... we have identified a potential conflict between one of our recent updates (3292) and a significant number of systems running on the Windows 7 64-bit platform that has caused systems to go into an infinite crash loop... video to help you solve this problem..."

- http://forums.avg.com/ww-en/avg-free-forum?sec=thread&act=show&id=132999#post_132999
[Read -entire- thread]

System crash after the recent AVG 2011 update 3292 (BSOD)
- http://free.avg.com/ww-en/faq?num=4080

- http://www.avg.com/us-en/faq?num=4079

Updated AVG 2011 Rescue CD/USB (for 3292 update)
- http://www.youtube.com/watch?v=Fam3-KSfA3A
___

- http://forums.avg.com/us-en/avg-free-forum?sec=thread&act=show&id=132917

- http://www.youtube.com/watch?v=x4hfiY55bkQ

:sad::confused::scratch:
 
Last edited:
ClamAV v0.96.5 released

FYI...

ClamAV v0.96.5 released
- http://secunia.com/advisories/42426
Last Update: 2010-12-08
Criticality level: Moderately critical
Impact: DoS, System access
Where: From remote
Solution Status: Vendor Patch
... The vulnerabilities are reported in versions prior to 0.96.5.
Solution: Update to version 0.96.5.

- http://www.clamav.net/lang/en/download/sources/
Latest stable release: ClamAV 0.96.5

- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4260
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4261

- http://www.h-online.com/security/ne...-most-of-Windows-into-quarantine-1139430.html
19 November 2010

:fear::fear:
 
Avira v10 SP1 updated

FYI...

Avira v10 SP1 updated
- http://techblog.avira.com/2010/12/08/update-for-paged-pool-problems/en/
December 8, 2010 - "We just published an update for Avira AntiVir 10 with Service Pack 1 that solves an issue some users were experiencing where their computers stopped to respond after a short time of running. An error message indicates in those cases that the paged pool memory isn’t sufficient. As a workaround it was possible to disable the process protection of Avira AntiVir. The now released update solves that issue. Those who disabled the process protection may enable it again after applying that update, which should happen automatically within the usual update cycle (exception: if the default configuration got changed and product updates explicitly got disabled)..."
Update 09.12.2010 - "On developer systems, this update may lead to problems when trying to debug software (thus only developers should be affected). We are still investigating the issue. As a workaround in case you experience this problem, disable the registry- and file-protection for the Avira AntiVir files in the configuration: Switch to expert mode in the configuration and scroll down to “general”, “security”. There untick the box next to the entry which protects from file- and registry manipulations. After that, reboot the computer. In some cases it is necessary to rename the Avira file avipbb.sys to avipbb.old (possible in safe mode)."

- http://secunia.com/advisories/40927/
Last Update: 2010-12-09
... The vulnerability is confirmed in version 10.0.0.565. Other versions may also be affected.
Solution: Reportedly fixed in avipbb.sys version 10.0.22.20 (available through the product update mechanism).

:confused::fear:
 
Last edited:
F-secure: false positive...

FYI...

F-secure: false positive...
- http://www.f-secure.com/weblog/archives/00002073.html
December 10, 2010 07:22 GMT - "Unfortunately we had a nasty false alarm couple of hours ago. The false alarm involved the detection Adware.smartad.d, which was in the database update 2010-12-09_10, released on 9th Dec 2236 UTC. This detection inadvertently triggered on the file google-analytics.com/ga.js. This file is a script associated with Google Analytics, and it's found on a fair number of websites. An exclusion for the file was released in the database update 2010-12-10_01 at 10th Dec 0052 UTC - about 2.5 hours after the bad update went out.
Apologies for any disruptions caused by this false alarm. We're sorry. To minimize disruptions, please make sure your product has been updated to use the latest database updates."

:fear::sad:
 
F-Secure remote binary vuln - updates available

FYI...

F-Secure remote binary vuln - updates available
- http://secunia.com/advisories/42566/
Release Date: 2010-12-15
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Solution: Apply patches. Patches are also distributed via the automatic update channel.
Original Advisory: F-Secure Security Advisory FSC-2010-4:
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-4.html
Last updated: 2010-12-15
Risk level: High
Brief description: Under certain circumstances, an attacker can trick the system into executing a binary file that has been planted on a disk resource that the computer can access... Administrators should download and apply the hotfixes listed...

- http://www.securitytracker.com/id?1024895
Dec 15 2010

:fear::fear:
 
Last edited:
Back
Top