what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

n.runs-SA-2008.004.txt

n.runs-SA-2008.004.txt
Posted Jul 29, 2008
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been found in the files parsing engine of AVG Anti-Virus that allows for a denial of service condition.

tags | advisory, denial of service, virus
SHA-256 | f8e2a7eb9a49fe4f8b79d61199b96c1b7b9d40bb66a745ea0e808ffb49f17b4b

n.runs-SA-2008.004.txt

Change Mirror Download
n.runs AG
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2008.004 28-Jul-2008
________________________________________________________________________

Vendor: Grisoft Inc., http://grisoft.com
Product: AVG Anti-Virus
Vulnerability: Divide by Zero - DoS (remote)
Risk: HIGH
________________________________________________________________________

Vendor communication:

2008-07-10 n.runs contacted AVG
2008-07-10 AVG response
2008-07-10 n.runs sent PoC files to AVG
2008-07-10 AVG started to investigate the PoCs
2008-07-14 AVG confirms the vulnerability and expect to
release a fix next week
2008-07-14 n.runs thanks AVG for the status report (waiting
for the fix next week)
2008-07-25 AVG releases fixed version
http://www.grisoft.com/ww.94247
2008-07-28 n.runs releases this advisory
________________________________________________________________________

Overview:

Grisoft is focused on developing software solutions that provide protection
from computer viruses. Grisoft's primary focus is to deliver the most
comprehensive and proactive protection available on the market.

Distributed globally through resellers and through the internet, the AVG
Anti-Virus product line supports all major operating systems and platforms.
More than 40 million users around the world use Grisoft AVG products to
protect their computers and networks.

Description:

A remotely exploitable vulnerability has been found in the files parsing
engine.

In detail, the following flaw was determined:

- A Denial of Service caused by a Divide by Zero while parsing UPX files.

Impact:

This problem can lead to remote denial of service if an attacker carefully
crafts a file that exploits the aforementioned vulnerability. The
vulnerability is present in AVG Antivirus software versions prior to the
program update AVG 8.0.156.

Solution:
The vulnerability was reported on 10.Jul.2008 and AVG 8.0.156 has been
issued on 25.Jul.2008 to solve this vulnerability. For detailed information
about the fixes follow the link in References [1] section of this document.
________________________________________________________________________

Credit:
Bugs found by Sergio 'shadown' Alvarez of n.runs AG.
________________________________________________________________________

References:
http://www.grisoft.com/ww.94247 [1]

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
________________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For all
other reproduction or publication, in printing or otherwise, contact
security@nruns.com for permission. Use of the advisory constitutes
acceptance for use in an "as is" condition. All warranties are excluded. In
no event shall n.runs be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special
damages, even if n.runs has been advised of the possibility of such damages.


Copyright 2008 n.runs AG. All rights reserved. Terms of use apply.

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close