NOD32 JAR BUFFER OVERFLOW VULNERBILITY

Discussion in 'NOD32 version 2 Forum' started by tempnexus, Sep 9, 2005.

Thread Status:
Not open for further replies.
  1. tempnexus

    tempnexus Registered Member

    Joined:
    Apr 16, 2003
    Posts:
    280
    Secunia Advisory: SA16604 Print Advisory
    Release Date: 2005-09-08

    Critical:
    Highly critical
    Impact: System access
    Where: From remote
    Solution Status: Vendor Patch

    Software: NOD32 for Windows NT/2000/XP 2.x

    Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

    Description:
    Secunia research has discovered a vulnerability in NOD32 Anti-Virus, which potentially can be exploited by malicious people to compromise a vulnerable system.

    The vulnerability is caused due to an error in handling ARJ archives containing compressed files with overly long filename. This can be exploited to cause a heap-based buffer overflow when a specially crafted ARJ archive is scanned.

    Successful exploitation may allow arbitrary code execution, but requires that archive scanning is enabled.

    The vulnerability has been confirmed in NOD32 for Windows NT/2000/2003/XP Trial Version 2.5 (with nod32.002 version 1.033 build 1127). Other versions may also be affected.

    Solution:
    Update to the latest version (nod32.002 version 1.034 build 1132) via online update.

    Provided and/or discovered by:
    Tan Chew Keong, Secunia Research.

    Original Advisory:
    Secunia Research:
    http://secunia.com/secunia_research/2005-40/advisory/


    Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

    Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
     
  2. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,798
    Location:
    Texas
Thread Status:
Not open for further replies.