ID

VAR-200904-0511


CVE

CVE-2009-1348


TITLE

McAfee VirusScan Used in products such as AV Vulnerabilities that can be avoided in the engine

Trust: 0.8

sources: JVNDB: JVNDB-2009-004587

DESCRIPTION

The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive. Multiple McAfee products are prone to a vulnerability that may allow certain compressed archives to bypass the scan engine. Successful exploits will allow attackers to distribute files containing malicious code that the antivirus application will fail to detect. The issue affects all McAfee software that uses DAT files. ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: McAfee Products Archive Handling Security Bypass SECUNIA ADVISORY ID: SA34949 VERIFY ADVISORY: http://secunia.com/advisories/34949/ DESCRIPTION: Some weaknesses have been reported in various McAfee products, which can be exploited by malware to bypass the scanning functionality. The weaknesses are caused due to errors in the handling of archive file formats (e.g. SOLUTION: Update .DAT files to DAT 5600 or later. http://www.mcafee.com/apps/downloads/security_updates/dat.asp PROVIDED AND/OR DISCOVERED BY: * Thierry Zoller * The vendor also credits Mickael Roger. ORIGINAL ADVISORY: McAfee: https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT Thierry Zoller: http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ________________________________________________________________________ From the low-hanging-fruit-department - Mcafee multiple generic evasions ________________________________________________________________________ Release mode: Coordinated but limited disclosure. Ref : TZO-182009 - Mcafee multiple generic evasions WWW : http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html Vendor : http://www.mcafee.com Status : Patched CVE : CVE-2009-1348 (provided by mcafee) https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT Security notification reaction rating : very good Notification to patch window : +-27 days (Eastern holidays in between) Disclosure Policy : http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html Affected products : - McAfee VirusScan\xae Plus 2009 - McAfee Total Protection\x99 2009 - McAfee Internet Security - McAfee VirusScan USB - McAfee VirusScan Enterprise - McAfee VirusScan Enterprise Linux - McAfee VirusScan Enterprise for SAP - McAfee VirusScan Enterprise for Storage - McAfee VirusScan Commandline - Mcafee SecurityShield for Microsoft ISA Server - Mcafee Security for Microsoft Sharepoint - Mcafee Security for Email Servers - McAfee Email Gateyway - McAfee Total Protection for Endpoint - McAfee Active Virus Defense - McAfee Active VirusScan It is unkown whether SaaS were affected (tough likely) : - McAfee Email Security Service - McAfee Total Protection Service Advanced I. Background ~~~~~~~~~~~~~ Quote: "McAfee proactively secures systems and networks from known and as yet undiscovered threats worldwide. Home users, businesses, service providers, government agencies, and our partners all trust our unmatched security expertise and have confidence in our comprehensive and proven solutions to effectively block attacks and prevent disruptions." II. Description ~~~~~~~~~~~~~~~ The parsing engine can be bypassed by a specially crafted and formated RAR (Headflags and Packsize),ZIP (Filelenght) archive. III. Impact ~~~~~~~~~~~ A general description of the impact and nature of AV Bypasses/evasions can be read at : http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html The bug results in denying the engine the possibility to inspect code within RAR and ZIP archives. There is no inspection of the content at all and hence the impossibility to detect malicious code. IV. Disclosure timeline ~~~~~~~~~~~~~~~~~~~~~~~~~ DD/MM/YYYY 04/04/2009 : Send proof of concept RAR I, description the terms under which I cooperate and the planned disclosure date 06/04/2009 : Send proof of concept RAR II, description the terms under which I cooperate and the planned disclosure date 06/04/2009 : Mcafee acknowledges receipt and reproduction of RAR I, ack acknowledges receipt of RARII 10/04/2009 : Send proof of concept ZIP I, description the terms under which I cooperate and the planned disclosure date 21/04/2009 : Mcafee provides CVE number CVE-2009-1348 28/04/2009 : Mcafee informs me that the patch might be released on the 29th 29/04/2009 : Mcafee confirms patch release and provides URL https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT 29/04/2009 : Ask for affected versions 29/04/2009 : Mcafee replies " This issue does affect all vs engine products, including both gateway and endpoint" _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/. Description ~~~~~~~~~~~~~~~ Improper parsing of the PDF structure leads to evasion of detection of malicious PDF documents at scantime and runtime. This has been tested with several malicious PDF files and represents a generic evasion of all PDF signatures and heuristics. General information about evasion/bypasses can be found at : http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html III. Impact ~~~~~~~~~~~ Known PDF exploits/malware may evade signature detection, 0day exploits may evade heuristics. Disclosure timeline ~~~~~~~~~~~~~~~~~~~~~~~~~ DD.MM.YYYY 01.06.2009 - Reported 20.10.2009 - McAfee informed us that they published the advisory on their website < waiting for others vendors to patch > 27.10.2009 - G-SEC releases this advisory About G-SEC ~~~~~~~~~~~ G-SEC\x99 is a vendor independent luxemburgish led IT security consulting group. More information available at : http://www.g-sec.lu/ _______________________________________________ Full-Disclosure - We believe in it. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia

Trust: 2.61

sources: NVD: CVE-2009-1348 // JVNDB: JVNDB-2009-004587 // BID: 36848 // BID: 34780 // VULHUB: VHN-38794 // PACKETSTORM: 77183 // PACKETSTORM: 77170 // PACKETSTORM: 82292 // PACKETSTORM: 82334

AFFECTED PRODUCTS

vendor:mcafeemodel:securityshield for microsoft isa serverscope: - version: -

Trust: 1.7

vendor:mcafeemodel:active virusscanscope: - version: -

Trust: 1.7

vendor:mcafeemodel:active virus defensescope: - version: -

Trust: 1.7

vendor:mcafeemodel:virusscan enterprisescope:eqversion: -

Trust: 1.6

vendor:mcafeemodel:email gatewayscope: - version: -

Trust: 1.4

vendor:mcafeemodel:total protection for endpointscope: - version: -

Trust: 1.4

vendor:mcafeemodel:virusscan plusscope:eqversion:2009

Trust: 1.3

vendor:mcafeemodel:total protectionscope:eqversion:2009

Trust: 1.3

vendor:mcafeemodel:virusscan command linescope: - version: -

Trust: 1.1

vendor:mcafeemodel:total protection for endpointscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:virusscan enterprisescope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:internet security suitescope:eqversion:2005

Trust: 1.0

vendor:mcafeemodel:virusscan commandlinescope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:active virus defensescope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:securityshield for microsoft sharepointscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:internet security suitescope:eqversion:2004

Trust: 1.0

vendor:mcafeemodel:virusscan usbscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:active virusscanscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:internet security suitescope:eqversion:2006

Trust: 1.0

vendor:mcafeemodel:internet security suitescope:eqversion:2009

Trust: 1.0

vendor:mcafeemodel:securityshield for email serversscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:securityshield for microsoft isa serverscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:internet security suitescope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:email gatewayscope:eqversion:*

Trust: 1.0

vendor:mcafeemodel:internet security suitescope: - version: -

Trust: 0.8

vendor:mcafeemodel:security for email serversscope: - version: -

Trust: 0.8

vendor:mcafeemodel:security for microsoft sharepointscope: - version: -

Trust: 0.8

vendor:mcafeemodel:virusscan enterprisescope: - version: -

Trust: 0.8

vendor:mcafeemodel:virusscan plusscope: - version: -

Trust: 0.8

vendor:mcafeemodel:virusscan usbscope: - version: -

Trust: 0.8

vendor:mcafeemodel:total protectionscope: - version: -

Trust: 0.8

vendor:mcafeemodel:virusscan enterprisescope:eqversion:0

Trust: 0.6

vendor:mcafeemodel:securityshield for email serversscope: - version: -

Trust: 0.6

vendor:mcafeemodel:securityshield for microsoft sharepointscope: - version: -

Trust: 0.6

vendor:mcafeemodel:virusscan commandlinescope: - version: -

Trust: 0.6

vendor:mcafeemodel:virusscan plusscope:eqversion:20070

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise i patchscope:eqversion:8.015

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise i patchscope:eqversion:8.012

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise i patchscope:eqversion:8.011

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise iscope:eqversion:8.0

Trust: 0.3

vendor:mcafeemodel:virusscan enterprisescope:eqversion:8.0

Trust: 0.3

vendor:mcafeemodel:virusscan enterprisescope:eqversion:7.1

Trust: 0.3

vendor:mcafeemodel:virusscanscope:eqversion:2006

Trust: 0.3

vendor:mcafeemodel:virusscanscope:eqversion:2005

Trust: 0.3

vendor:mcafeemodel:virusscanscope:eqversion:2004

Trust: 0.3

vendor:mcafeemodel:virexscope:eqversion:7.7

Trust: 0.3

vendor:mcafeemodel:virexscope: - version: -

Trust: 0.3

vendor:mcafeemodel:total protectionscope:eqversion:20070

Trust: 0.3

vendor:mcafeemodel:portalshield for microsoft sharepointscope: - version: -

Trust: 0.3

vendor:mcafeemodel:netshield for netwarescope:eqversion:4

Trust: 0.3

vendor:mcafeemodel:netshield for netwarescope: - version: -

Trust: 0.3

vendor:mcafeemodel:linuxshieldscope:eqversion:1

Trust: 0.3

vendor:mcafeemodel:linuxshieldscope: - version: -

Trust: 0.3

vendor:mcafeemodel:groupshield for lotus domino on windowsscope:eqversion:5

Trust: 0.3

vendor:mcafeemodel:groupshield for lotus domino on aixscope:eqversion:5

Trust: 0.3

vendor:mcafeemodel:groupshield for lotus dominoscope:eqversion:7

Trust: 0.3

vendor:mcafeemodel:groupshield for lotus dominoscope: - version: -

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:5.55.0.964.1

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:5.55.0.902.1

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:5.55.0.1007.1

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:20005

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:6.0

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:5.5

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:6.0.616.102

Trust: 0.3

vendor:mcafeemodel:groupshield for exchangescope:eqversion:4

Trust: 0.3

vendor:mcafeemodel:virusscan usbscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:virusscan professionalscope: - version: -

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise linuxscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise for storagescope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:virusscan enterprise for sapscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:total protection for endpointscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:total protectionscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:security for microsoft sharepointscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:security for email serversscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:internet securityscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:0

Trust: 0.3

sources: BID: 36848 // BID: 34780 // JVNDB: JVNDB-2009-004587 // CNNVD: CNNVD-200904-560 // NVD: CVE-2009-1348

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1348
value: HIGH

Trust: 1.0

NVD: CVE-2009-1348
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200904-560
value: HIGH

Trust: 0.6

VULHUB: VHN-38794
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1348
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38794
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38794 // JVNDB: JVNDB-2009-004587 // CNNVD: CNNVD-200904-560 // NVD: CVE-2009-1348

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-38794 // JVNDB: JVNDB-2009-004587 // NVD: CVE-2009-1348

THREAT TYPE

network

Trust: 0.6

sources: BID: 36848 // BID: 34780

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200904-560

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-004587

PATCH

title:SB10001url:https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT

Trust: 0.8

sources: JVNDB: JVNDB-2009-004587

EXTERNAL IDS

db:NVDid:CVE-2009-1348

Trust: 3.1

db:MCAFEEid:SB10001

Trust: 2.2

db:BIDid:34780

Trust: 2.0

db:SECUNIAid:34949

Trust: 1.9

db:JVNDBid:JVNDB-2009-004587

Trust: 0.8

db:BUGTRAQid:20090501 [TZO-18-2009] MCAFEE MULTIPLE EVASIONS/BYPASSES (RAR, ZIP)

Trust: 0.6

db:CNNVDid:CNNVD-200904-560

Trust: 0.6

db:MCAFEEid:SB10003

Trust: 0.5

db:BIDid:36848

Trust: 0.4

db:SECUNIAid:37179

Trust: 0.2

db:VULHUBid:VHN-38794

Trust: 0.1

db:PACKETSTORMid:77183

Trust: 0.1

db:PACKETSTORMid:77170

Trust: 0.1

db:PACKETSTORMid:82292

Trust: 0.1

db:PACKETSTORMid:82334

Trust: 0.1

sources: VULHUB: VHN-38794 // BID: 36848 // BID: 34780 // JVNDB: JVNDB-2009-004587 // PACKETSTORM: 77183 // PACKETSTORM: 77170 // PACKETSTORM: 82292 // PACKETSTORM: 82334 // CNNVD: CNNVD-200904-560 // NVD: CVE-2009-1348

REFERENCES

url:http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html

Trust: 2.2

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10001&actp=list_recent

Trust: 2.1

url:http://www.securityfocus.com/bid/34780

Trust: 1.7

url:http://secunia.com/advisories/34949

Trust: 1.7

url:http://www.securityfocus.com/archive/1/503173/100/0/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1348

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1348

Trust: 0.8

url:http://www.mcafee.com/

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/503173/100/0/threaded

Trust: 0.6

url:http://www.g-sec.lu/mcafee-pdf-bypass.html

Trust: 0.5

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10003

Trust: 0.5

url:/archive/1/503173

Trust: 0.3

url:http://www.mcafee.com/apps/downloads/security_updates/dat.asp

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://www.mcafee.com

Trust: 0.2

url:http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10001&amp;actp=list_recent

Trust: 0.1

url:http://secunia.com/advisories/34949/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

url:http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Trust: 0.1

url:http://www.g-sec.lu/

Trust: 0.1

url:http://secunia.com/advisories/37179/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

sources: VULHUB: VHN-38794 // BID: 36848 // BID: 34780 // JVNDB: JVNDB-2009-004587 // PACKETSTORM: 77183 // PACKETSTORM: 77170 // PACKETSTORM: 82292 // PACKETSTORM: 82334 // CNNVD: CNNVD-200904-560 // NVD: CVE-2009-1348

CREDITS

Thierry Zoller and Mickael Roger

Trust: 0.9

sources: BID: 34780 // CNNVD: CNNVD-200904-560

SOURCES

db:VULHUBid:VHN-38794
db:BIDid:36848
db:BIDid:34780
db:JVNDBid:JVNDB-2009-004587
db:PACKETSTORMid:77183
db:PACKETSTORMid:77170
db:PACKETSTORMid:82292
db:PACKETSTORMid:82334
db:CNNVDid:CNNVD-200904-560
db:NVDid:CVE-2009-1348

LAST UPDATE DATE

2024-11-23T22:09:03.525000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38794date:2018-10-10T00:00:00
db:BIDid:36848date:2015-03-19T09:04:00
db:BIDid:34780date:2009-05-01T22:46:00
db:JVNDBid:JVNDB-2009-004587date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200904-560date:2009-05-19T00:00:00
db:NVDid:CVE-2009-1348date:2024-11-21T01:02:15.190

SOURCES RELEASE DATE

db:VULHUBid:VHN-38794date:2009-04-30T00:00:00
db:BIDid:36848date:2009-10-27T00:00:00
db:BIDid:34780date:2009-04-30T00:00:00
db:JVNDBid:JVNDB-2009-004587date:2012-09-25T00:00:00
db:PACKETSTORMid:77183date:2009-05-02T05:21:02
db:PACKETSTORMid:77170date:2009-05-01T02:03:00
db:PACKETSTORMid:82292date:2009-10-28T01:02:31
db:PACKETSTORMid:82334date:2009-10-28T15:59:53
db:CNNVDid:CNNVD-200904-560date:2009-04-30T00:00:00
db:NVDid:CVE-2009-1348date:2009-04-30T20:30:00.467