Vulnerability Name:

CCN-72995

Published:2012-02-02
Updated:2012-02-02
Summary:Multiple vendors could allow a local attacker to bypass security restrictions, caused by a vulnerability in the scanner engine. By sending a specially-crafted KuaiZip (.kz) archive file, an attacker could exploit this vulnerability to bypass scanning detection and possibly launch further attacks on the vulnerable system.
CVSS v3 Severity:5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.6 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P)
2.9 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: VirusBlokAda Web page
VirusBlokAda

Source: CCN
Type: Full-disclosure Mailing List, Thu Feb 02 2012
Multiple vendor antivirus .kz archive format evasion/bypass vulnerability

Source: CCN
Type: BID-51861
Multiple AntiVirus Products '.kz' Scan Evasion Vulnerability

Source: CCN
Type: Sophos Web site
Sophos

Source: CCN
Type: VirusBuster Web site
VirusBuster

Source: XF
Type: UNKNOWN
multiple-kz-security-bypass(72995)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:virusblokada:vba32_personal_antivirus:3.12.8:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.81:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.82:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.83:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.84:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.85:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.86:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.90:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.91:*:*:*:*:*:*:*
  • OR cpe:/a:sophos:anti-virus:3.95:*:*:*:*:*:*:*
  • OR cpe:/a:virusbuster:virusbuster_internet_securit_suite:3.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    virusblokada vba32 personal antivirus 3.12.8
    sophos anti-virus 3.81
    sophos anti-virus 3.82
    sophos anti-virus 3.83
    sophos anti-virus 3.84
    sophos anti-virus 3.85
    sophos anti-virus 3.86
    sophos anti-virus 3.90
    sophos anti-virus 3.91
    sophos anti-virus 3.95
    virusbuster virusbuster internet securit suite 3.2