Full Disclosure mailing list archives

Re: Secunia Research: HAURI Anti-Virus Compressed Archive Directory Traversal


From: "Steven M. Christey" <coley () mitre org>
Date: Tue, 23 Aug 2005 14:42:22 -0400 (EDT)


The vulnerability is caused due to unsafe extraction of compressed
archives (e.g. ACE, ARJ, CAB, LZH, RAR, TAR and ZIP) into a temporary
directory before scanning. This can be exploited to write files into
arbitrary directories when scanning a malicious archive containing
files that have "/../" or "../../" directory sequences in their
filenames.

...

Apply patches.

ViRobot Linux Server 2.0:
http://www.globalhauri.com/html/download/down_unixpatch.html

This vendor page is titled "ViRobot Unix/Linux Server Security
Vulnerability Patch."

However, it goes on to describe a buffer overflow problem:

  1. Patch for Buffer Over Flow Vulnerability
  - Vulnerability Type
  : Buffer Over Flow

  - Introduction to Patch
  : Vulnerability Patch for BOF(Buffer Over Flow) via HTTP_COOKIE


There is no mention of directory traversal.

This inconsistency makes it unclear whether HAURI has specifically
fixed the directory traversal issue, and in addition it mentions
another potentially more serious issue that has likely been missed by
most advisory readers.

- Steve
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: