Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

1/7/2020
10:25 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Researcher Proven Right, but It Took 10 Years

After a decade of trying, security researcher Thierry Zoller has finally seen the generalized vulnerability he found in some AV products patched.

It took ten years, but security researcher Thierry Zoller has finally seen the generalized vulnerability he foundin some AV products patched.

The general concept of the bug was not new, even at the time Zoller published. Holler admits that it was known since 2004/2005. He also says that even when notified “not every Anti-virus vendor cared enough to close these apparent problems, or add a logic for gateway products to allow them to block bypasses on request.”

The evasion happens if a format is manipulated in such a way that the scanner thinks it is of another filetype. This causes the AV product to execute another branch of code (and hence logic) that can result in a complete bypass of the protector code necessary to detect the original malware.

The bug can affect multiple types of archive formats including ISO, ZIP and Bz2.

The manipulated archive can be unpacked at the client but not at the server level. An AV engine cannot extract an archive, but the user can. That is the crux of the problem. If AV can’t extract the archive, they have no idea if it is safe to run or not.

This “feature” is also a problem for AV clients if they are being run in an environment where files are not executed. That includes gateway products like fileservers, mail and webservers.

It took until 2017 for Zoller to once again sound the alarm about the problem at Cansecwest. The presentation served as a marker of what had been done by the AV vendors to that point about the problem --basically nothing. Even when notified by Zoller, they came up with reasons why that the vulnerability would not affect routine use.

Zoller says that “one vendor argued that this could not be called a vulnerability because it would not impact Integrity, Availability or Confidentiality. Another Vendor argued that this cannot pose a "risk" to their customers because of XYZ (assumptions).”

But in November 2019, Trustwave discovered that a normal but specially crafted ZIP file was being used in a phishing email to distribute the NanoCore Remote Access Trojan (RAT). The attachment would totally bypass the secured email gateway that was in use and showed as normal.

Uh-oh. Looks like Zoller was right. Things started to get fixed by the AV vendors.

Kaspersky ended up saying in its security advisory that, “We also have fixed three bugs in one of anti-virus (AV) engine components that is responsible for work with ZIP archives. The fix for this component corrects its behaviour in situation of antivirus scanning specially crafted ZIP archives. These malformed archives could be used to circumvent our antivirus scan process. The bugs affected Kaspersky products with antivirus databases.”

ESET’s advisory was more discreet, only saying that “Fixed unpacking of some malformed archives, reported by Thierry Zoller”.

Bitdefender and Avira seemed to have issued “silent” patches that improved the archive handling, but didn’t call attention to the long lag in mitigating the situation.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Assessing Cybersecurity Risk in Todays Enterprises
Assessing Cybersecurity Risk in Todays Enterprises
COVID-19 has created a new IT paradigm in the enterprise and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...