Multiple AV vendor vulns - archived

AplusWebMaster

New member
Advisor Team
FYI...

(See: https://knowledge.mcafee.com/article/26/612496_f.SAL_Public.html
"...before applying the HotFix...")

- http://secunia.com/advisories/24466/
Release Date: 2007-03-14
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Software:
McAfee ePolicy Orchestrator 3.x
McAfee ProtectionPilot 1.x
...Successful exploitation allows execution of arbitrary code.
The vulnerabilities affect the following products:
* McAfee ePolicy Orchestrator 3.5.0 (Patch 5 and earlier)
* McAfee ePolicy Orchestrator 3.6.0 (Patch 5 earlier)
* McAfee ePolicy Orchestrator 3.6.1
* McAfee ProtectionPilot 1.1.1 (Patch 3 and earlier)
* McAfee ProtectionPilot 1.5.0
Solution: Apply hotfix/patch.
https://mysupport.mcafee.com/eservice_enu/start.swe ..."

-----------------------------------------------------------
- http://secunia.com/advisories/24450/
Release Date: 2007-03-15
Critical: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
...The vulnerability reportedly affects all Trend Micro products that use Scan Engine version 8.0 and above with Pattern File technology.
Solution: Update the virus pattern file to OPR 4.335.00 or higher...
Original Advisory: Trend Micro:
http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034587 ..."

-----------------------------------------------------------
- http://support.f-secure.com/enu/corporate/downloads/hotfixes/av-cs-hotfixes.shtml
F-Secure Anti-Virus Client Security 6.02 and 6.03
Mar 12, 2007 - Client Security Hotfix FSAVCS603_HF02 (675 KB)
"This hotfix improves error handling in the parts of F-Secure BackWeb Client responsible for setting the Management Server address on the Client side."

:fear: :fear:

FYI...

Kaspersky multiple vulns - updates available
- http://secunia.com/advisories/24778/
Release Date: 2007-04-05
Critical: Highly critical
Impact: Privilege escalation, DoS, System access, Exposure of sensitive information, Exposure of system information
Where: From remote
Solution Status: Vendor Patch
Solution: Update to version 6.0.2.614 or later.

Kaspersky Anti-Virus for Windows Workstations:
http://www.kaspersky.com/productupdates?chapter=146274385
Kaspersky Anti-Virus for Windows Server:
http://www.kaspersky.com/productupdates?chapter=146274391
Kaspersky Internet Security 6.0:
http://www.kaspersky.com/productupdates?chapter=186437046
Kaspersky Anti-Virus 6.0:
http://www.kaspersky.com/productupdates?chapter=186435857 ..."

.

FYI...

McAfee VirusScan vuln - update available
- http://secunia.com/advisories/24914/
Release Date: 2007-04-18
Critical: Moderately critical
Impact: DoS, System access
Where: From remote
Solution Status: Vendor Patch
Software: McAfee VirusScan Enterprise 8.x
...The vulnerability reportedly affects versions 8.0i Patch 11 and prior.
Solution: Apply Patch 12 or later.
https://mysupport.mcafee.com/eservice_enu/start.swe ...

McAfee e-Business Svr DoS vuln - update available
- http://secunia.com/advisories/24893/
Release Date: 2007-04-18
Critical: Less critical
Impact: DoS
Where: From local network
Solution Status: Vendor Patch
Software: McAfee e-Business Server 8.x ...
Solution: Apply updates.
https://secure.nai.com/apps/downloads/my_products/login.asp ...
Original Advisory: McAfee:
http://preview.tinyurl.com/2wlsg9 ...

.

FYI...

avast! DoS Vuln - update available
- http://secunia.com/advisories/25137/
Release Date: 2007-05-08
Critical: Less critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Software: avast! Home/Professional 4.x
...The vulnerability is reported in avast! Home Edition and avast! Professional Edition.
Solution: Update to version 4.7.981 or later...
Original Advisory:
avast!: http://www.avast.com/eng/avast-4-home_pro-revision-history.html ..."

.

FYI...

McAfee SecurityCenter ActiveX vuln - updates available
- http://secunia.com/advisories/25173/
Release Date: 2007-05-09
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch ...
...The vulnerability affects versions -prior- to 7.2.147 and 6.0.25.
Solution: The fix has reportedly been available via automatic updates since March 22, 2007.
Update to Security Center version 7.2.147 and 6.0.25, or higher.
http://us.mcafee.com/root/login.asp ..."

:fear:

FYI...

Trend Micro ServerProtect vuln - update available

- http://secunia.com/advisories/25186/
Last Update: 2007-05-09
Critical: Moderately critical
Impact: System access
Where: From local network
Solution Status: Vendor Patch
Software: Trend Micro ServerProtect for Windows/NetWare 5.x
...Successful exploitation of the vulnerabilities allows execution of arbitrary code...
Original Advisory: Trend Micro:
http://www.trendmicro.com/download_beta/product.asp?productid=17 ..."

> http://isc.sans.org/diary.html?storyid=2774
Last Updated: 2007-05-09 16:04:05 UTC

:fear:

FYI...

NOD32 AV vuln - update available
- http://secunia.com/advisories/25375/
Release Date: 2007-05-23
Critical: Moderately critical
Impact: Privilege escalation, System access
Where: From remote
Solution Status: Vendor Patch
Software: NOD32 for Windows NT/2000/XP/2003 2.x
...Successful exploitation may allow execution of arbitrary code.
The vulnerabilities are reported in versions prior to 2.70.37.
Solution: Update to version 2.70.39.
http://www.eset.com/download/registered_software.php ..."

.

FYI...

- http://secunia.com/advisories/25380/
Release Date: 2007-05-24
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
...Successful exploitation may allow execution of arbitrary code.
The vulnerability reportedly affects versions prior to 4.7.766 for servers and 4.7.700 for the Managed Client product.
Solution: Update to the latest versions.
http://www.avast.com/eng/download.html
Original Advisory: avast!:
http://www.avast.com/eng/adnm-management-client-revision-history.html
http://www.avast.com/eng/avast-4-server-revision-history.html ..."

.

FYI...

- http://secunia.com/advisories/25417/
Release Date: 2007-05-29
Critical: Highly critical
Impact: DoS, System access
Where: From remote
Solution Status: Vendor Patch...
Solution: Update to AVPack version 7.03.00.09 and Engine version 7.04.00.24. These updates have reportedly been made available since 2007-05-23...
Original Advisory: Avira:
http://forum.antivir-pe.de/thread.php?threadid=22528 ..."

.

FYI...

F-Secure Anti-Virus 5 hotfixes
> http://support.f-secure.com/enu/corporate/downloads/hotfixes/av5-hotfixes.shtml

------------------------------------------------

F-Secure Products vuln - updates available
- http://secunia.com/advisories/25426/
Release Date: 2007-05-30
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Software:
F-Secure Anti-Virus 2005
F-Secure Anti-Virus 2006
F-Secure Anti-Virus 2007
F-Secure Anti-Virus 5.x
F-Secure Anti-Virus Client Security 6.x
F-Secure Anti-Virus for Citrix Servers 5.x
F-Secure Anti-Virus for Linux 4.x
F-Secure Anti-Virus for Microsoft Exchange 6.x
F-Secure Anti-Virus for MIMEsweeper 5.x
F-Secure Anti-Virus for Windows Servers 5.x
F-Secure Anti-Virus for Workstations 5.x
F-Secure Internet Gatekeeper 6.x
F-Secure Internet Gatekeeper for Linux 2.x
F-Secure Internet Security 2005
F-Secure Internet Security 2006
F-Secure Internet Security 2007 ...
The vulnerability is caused due to a boundary error in the processing of LHA archives and can be exploited to cause a buffer overflow when decompressing a specially crafted archive.
The vulnerability is related to #1 in: http://secunia.com/SA21996/
Successful exploitation may allow execution of arbitrary code.
Solution: Apply hotfixes.
F-Secure Internet Security 2005 - 2007: Hotfix distributed automatically.
F-Secure Anti-Virus 2005 - 2007: Hotfix distributed automatically.
F-Secure Protection Service for Consumers: Hotfix distributed automatically...
Original Advisory: F-Secure: http://www.f-secure.com/security/fsc-2007-1.shtml ..."
------------------------------------------------

F-Secure AV vuln - update available
- http://secunia.com/advisories/25439/
Release Date: 2007-05-30
Critical: Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Vendor Patch
Software:
F-Secure Anti-Virus 2005
F-Secure Anti-Virus 2006
F-Secure Anti-Virus 2007
F-Secure Anti-Virus 5.x
F-Secure Anti-Virus Client Security 6.x
F-Secure Anti-Virus for Citrix Servers 5.x
F-Secure Anti-Virus for MIMEsweeper 5.x
F-Secure Anti-Virus for Windows Servers 5.x
F-Secure Anti-Virus for Workstations 5.x
F-Secure Internet Security 2005
F-Secure Internet Security 2006
F-Secure Internet Security 2007
...The vulnerability is caused due to an error in the real-time scanning component and can be exploited to execute arbitrary code with escalated privileges via specially crafted I/O request packets.
Solution: F-Secure Internet Security 2005 - 2007: Hotfix distributed automatically.
F-Secure Anti-Virus 2005 - 2007: Hotfix distributed automatically.
F-Secure Protection Service for Consumers 5.00 - 6.40: Hotfix distributed automatically...
Original Advisory: F-Secure: http://www.f-secure.com/security/fsc-2007-2.shtml ..."
----------------------------

F-Secure Policy Mgr Svr DoS Vuln - update available
- http://secunia.com/advisories/25449/
Release Date: 2007-05-30
Critical: Less critical
Impact: DoS
Where: From local network
Solution Status: Vendor Patch
...The vulnerability is caused due to an error within the fsmsh.dll host module and can be exploited to e.g. crash the server by specifying NTFS reserved names as URL filenames. The vulnerability affects versions 7.00 and prior.
Solution: Update to 7.01 or apply hotfix. http://www.f-secure.com/webclub/fspm.html
ftp://ftp.f-secure.com/support/hotfix/fspm/fspms-700-60x-570-hotfix2.zip ...
Original Advisory: F-Secure:
http://www.f-secure.com/security/fsc-2007-4.shtml ..."

.
 
Last edited:
Symantec Ghost/Reporting-Svr vulns - updates available

FYI...

- http://secunia.com/advisories/25539/
Release Date: 2007-06-06
Critical: Less critical
Impact: DoS
Where: From local network
Solution Status: Vendor Patch
Software: Symantec Ghost Solution Suite 1.x, Symantec Ghost Solution Suite 2.x ...
Original Advisory: Symantec:
http://securityresponse.symantec.com/avcenter/security/Content/2007.06.05b.html ..."

- http://secunia.com/advisories/25543/
Release Date: 2007-06-06
Critical: Moderately critical
Impact: Security Bypass, Manipulation of data, Exposure of sensitive information
Where: From local network
Solution Status: Vendor Patch
Software: Symantec AntiVirus Corporate Edition 10.x, Symantec Client Security 3.x, Symantec Reporting Server 1.x ...
Solution: Update to version 1.0.224.0.
SAV 10.1 MR6 build 6000 (10.1.6.6000) or later / SCS 3.1 MR6 build 6000 (3.1.6.6000) or later:
https://fileconnect.symantec.com/licenselogin.jsp ...
Original Advisory:
Symantec:
http://securityresponse.symantec.com/avcenter/security/Content/2007.06.05.html
http://securityresponse.symantec.com/avcenter/security/Content/2007.06.05a.html ..."

.
 
CA AV vuln - update available

FYI...

CA Anti-Virus Engine CAB Archive Processing Buffer Overflows
- http://secunia.com/advisories/25570/
Release Date: 2007-06-06
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch ...
Solution: Content update 30.6 has been issued to address the vulnerabilities (please see the vendor's advisory for details)...
Original Advisory: CA:
http://supportconnectw.ca.com/public/antivirus/infodocs/caantivirus-securitynotice.asp ..."


.
 
FYI...

McAfee ePolicy Orchestrator / ProtectionPilot Common Management Agent Vulns
- http://secunia.com/advisories/26029/
Release Date: 2007-07-11
Critical: Moderately critical
Impact: System access
Where: From local network
Solution Status: Vendor Patch
Software: McAfee ePolicy Orchestrator 3.x, McAfee ProtectionPilot 1.x
...Successful exploitation of this vulnerability allows execution of arbitrary code...
Solution: Apply patches. Please see the vendor's advisories for details...
McAfee:
https://knowledge.mcafee.com/article/761/613364_f.SAL_Public.html
https://knowledge.mcafee.com/article/762/613365_f.SAL_Public.html
https://knowledge.mcafee.com/article/763/613366_f.SAL_Public.html
https://knowledge.mcafee.com/article/764/613367_f.SAL_Public.html ...

- http://www.us-cert.gov/current/#mcafee_products_code_execution_vulnerabilities
July 16, 2007

.
 
Last edited:
FYI...

Trend Micro OfficeScan vuln - updates available
- http://atlas.arbor.net/briefs/index#-1118575019
July 17, 2007 - "A malicious web request with an overly long session cookie can be sent to the Trend Micro OfficeScan web interface to trigger a buffer overflow in the component CGIOCommon.dll. Successful exploitation can allow the remote, anonymous attacker to execute code on the system with the permissions of the IIS web server. Trend Micro has released updated code to address this issue.
Analysis: This is a relatively trivial attack to launch for most attackers. We have not yet seen tools to exploit this, but we expect that some will be developed soon.
Source:
> http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=559
7.16.07 - "...Trend Micro has addressed this vulnerability by releasing the following patches for affected products.
CSM3.6 security patch 1149
CSM3.5 security patch 1152
CSM3.0 security patch 1209
http://www.trendmicro.com/download/product.asp?productid=39
OSCE 8.0 security patch 1042
OSCE 7.3 security patch 1293
OSCE 7.0 security patch 1364
OSCE 6.5 security patch 1364
OSCE 6.0 for SMB2.0 security patch 1398
http://www.trendmicro.com/download/product.asp?productid=5 ..."

.
 
Updated:

Symantec AntiVirus Malformed RAR and CAB Compression Type Bypass - SYM07-019
- http://www.symantec.com/avcenter/security/Content/2007.07.11f.html
Last modified on: Wednesday, 18-Jul-07 16:53:13 ...
Revision History:
Removed invalid CVE information
Added missing product information
Updated Symantec AntiVirus Corporate addition version information
Added information and link to new update tool for Symantec AntiVirus and Symantec Client Security
Risk Impact: High
Remote Access: -Yes- ...

> http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2007071111591448
Last Modified: 07/18/2007

.
 
FYI...

> http://atlas.arbor.net/briefs/index#1027704494
Panda Antivirus EXE File Parsing Buffer Overflow Vulnerability
Severity: High Severity
Published: July 23, 2007
Panda AV is vulnerable to a buffer overflow when processing Windows EXE files. The error comes in an integer cast when parsing EXE header data. A malicious attacker could send the victim a malformed EXE file to be processed by Panda AV. This would then allow the attacker to run arbitrary code on the victim's computer. Updates have been made available.
Analysis: This is a similar issue to the Eset NOD32 file processing issue and nearly a dozen such vulnerabilities recently. We believe that this trend will continue for some time.
Source: http://secunia.com/advisories/26171/

NOD32 Antivirus Multiple File Processing Vulnerabilities
Severity: High Severity
Published: July 23, 2007
Eset NOD32 antivirus is vulnerable to file processing vulnerabilities that could be abused by a remote attacker to compromise a system. The AV software has problems processing CAB, ASPack, and FSG packed files. Malformed files could be sent to a victim to be processed by NOD32 and then run arbitrary code on the server. Eset has issued updated software to address this issue.
Analysis: This is another AV vulnerability in handling files. We do not expect it to be the last one, in this package or any other AV package.
Source: http://secunia.com/advisories/26124/

.
 
CA AV and other multiple products vuln - updates available

FYI...

CA AV and other multiple products vuln - updates available
- http://secunia.com/advisories/26155/
Release Date: 2007-07-25
Critical: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch ...
Description: Two vulnerabilities have been reported in various CA products, which can be exploited by malicious people to cause a DoS...

(See the advisory for the long list of affected products.)

Also see: http://secunia.com/advisories/26190/
Release Date: 2007-07-25
Critical: Moderately critical
Impact: System access
Where: From local network
Solution Status: Vendor Patch
...The vulnerability affects all versions of the CA Message Queuing software prior to v1.11 Build 54_4 on Windows and Netware..."

:fear:
 
FYI...

ClamAV multiple vulns - update available
- http://secunia.com/advisories/26530/
Release Date: 2007-08-22
Critical: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Software: Clam AntiVirus (clamav) 0.x...
Solution:
Update to version 0.91.2.
- http://sourceforge.net/project/showfiles.php?group_id=86638&package_id=90197&release_id=533658
2007-08-21


Trend Micro ServerProtect multiple vulns - update available
- http://secunia.com/advisories/26523/
Release Date: 2007-08-22
Critical: Moderately critical
Impact: System access
Where: From local network
Solution Status: Vendor Patch
Software: Trend Micro ServerProtect for Windows/NetWare 5.x...
Solution: Apply Security Patch 4 - Build 1185.
http://www.trendmicro.com/ftp/products/patches/spnt_558_win_en_securitypatch4.exe
Original Advisory: Trend Micro:
http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt

Also see: http://secunia.com/advisories/26557/
Software: Trend Micro Anti-Spyware 3.x, Trend Micro PC-cillin Internet Security 2007

.
 
FYI...

Sophos AV vuln - update available
- http://secunia.com/advisories/26580/
Release Date: 2007-08-24
Critical: Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch
Software: Sophos Anti-Virus...
The vulnerabilities are reported in Sophos Anti-Virus with engine versions prior to 2.48.0.
Solution: Update to engine version 2.48.0 or later...
Original Advisory: http://www.sophos.com/support/knowledgebase/article/28407.html
http://www.sophos.com/support/knowledgebase/article/14244.html ...

.
 
FYI...

Sophos AV vuln - updates available
- http://secunia.com/advisories/26714/
Release Date: 2007-09-07
Critical: Moderately critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch
Software: Sophos Anti-Virus 7.x, Sophos Anti-Virus for Windows 6.x
...The vulnerability is reported in versions 6.x and 7.0.0.
Solution: Update to versions 6.5.8 or later, or 7.0.1 or later. The vendor also recommends users of version 6.x to upgrade to version 7.
Original Advisory:
http://www.sophos.com/support/knowledgebase/article/29150.html

.
 
FYI...

AOL AV changes...
- http://isc.sans.org/diary.html?storyid=3360
Last Updated: 2007-09-08 01:29:38 UTC - "...It appears that AOL has switched from Kaspersky to McAfee and are now distributing "McAfee Virus Scan Plus-Special edition from AOL" according to this page*. It isn't entirely clear how (or if) this was communicated to the folks using the Kaspersky software. If you follow the link at the bottom of the page it looks like the old software may still get updates if you point back to a Kaspersky site, but that isn't entirely clear and I was unable to find anyone to answer that question for sure today (I'll update the story if I get more info). Without some action by the user, however, it appears that they will now be unprotected, which is unfortunate. In the meantime, if you have an AOL e-mail address, you can still get free anti-virus software from here**..."

* http://www.activevirusshield.com/antivirus/freeav/index.adp

** http://safety.aol.com/isc/BasicSecurity/

.
 
FYI...

Kaspersky AV DoS vuln - update 11.2007
- http://secunia.com/advisories/26887/
Last Update: 2007-09-25
Critical: Not critical
Impact: DoS
Where: Local system
Solution Status: Unpatched
Software: Kaspersky Anti-Virus 6.x
Kaspersky Anti-Virus 7.x
Kaspersky Internet Security 6.x
Kaspersky Internet Security 7.x
...The vulnerabilities are reported in version 7.0 build 125. Other versions may also be affected.
Solution: The vendor is reportedly working on an update to be released November 2007.
Original Advisory: Kaspersky:
http://www.kaspersky.com/technews?id=203038706
"...This is not the first time that this author has failed to notify us about a vulnerability before making it public, despite the fact that notifying the vendor first is de facto an industry standard..."

> http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5043

.
 
FYI...

BitDefender Online Scanner ActiveX vuln - update available
- http://secunia.com/advisories/27717/
Release Date: 2007-11-21
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
...Successful exploitation allows execution of arbitrary code. The vulnerability is reported in version 8.0. Other versions may also be affected.
Solution: Update to the latest version (OScan82.ocx).
http://www.bitdefender.com/scan8/ie.html

:fear:
 
Last edited:
FYI...

Trend Micro AV plus AS 2008, Internet Security 2008, Internet Security Pro 2008
- http://esupport.trendmicro.com/support/viewxml.do?ContentID=1036464
12/10/07 - "...Remote memory corruption... long bogus file names from malformed ZIP files... Vulnerability only affects users with English Versions of TIS16 (Trend Micro Internet Security Pro, Trend Micro Internet Security/Virus Buster 2008) and TAV16 (TrendMicro Antivirus plus AntiSpyware 2008) build #1450 and older... You can download the TIS16.0 English language security patch here..."

:fear:
 
Clam AV vuln - update available

FYI...

Clam AV vuln - update available
- http://secunia.com/advisories/28117/
Release Date: 2007-12-19
Critical: Highly critical
Impact: DoS, System access
Where: From remote
...The vulnerability is reported in versions prior to 0.92...
Solution: Update to version 0.92.

> http://www.clamav.org/
ClamAV Virus Databases: main.cvd ver. released on 09 Dec 2007 15:50 +0000

> http://www.clamwin.com/
The latest version of Clamwin Free Antivirus is 0.91.2

:fear:
 
FYI...

- http://www.heise-security.co.uk/articles/100965
21.12.2007 - "...The list of manufacturers of antivirus software with critical security problems reads like a Who's Who of the industry: the blacklist of Zoller and Alvarez includes Avast, Avira, BitDefender, CA, ClamAV, Eset NOD32, F-Secure, Grisoft AVG, Norman, Panda and Sophos. iDefense uncovered critical buffer overflows in Kaspersky's scanner, McAfee's VirusScan and Trend Micro's security products. Secunia found the same thing in Symantec's E-mail Security, and ISS/IBM XForce caught out Microsoft's security products. All of these appeared just this year, and the list is by no means complete: the n.runs specialists alone say they have discovered more than 80 critical holes and passed them on to the manufacturers. As far as they know, only some thirty of them have been closed so far..."

:fear:
 
Back
Top