Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

1/7/2020
10:25 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Researcher Proven Right, but It Took 10 Years

After a decade of trying, security researcher Thierry Zoller has finally seen the generalized vulnerability he found in some AV products patched.

It took ten years, but security researcher Thierry Zoller has finally seen the generalized vulnerability he foundin some AV products patched.

The general concept of the bug was not new, even at the time Zoller published. Holler admits that it was known since 2004/2005. He also says that even when notified “not every Anti-virus vendor cared enough to close these apparent problems, or add a logic for gateway products to allow them to block bypasses on request.”

The evasion happens if a format is manipulated in such a way that the scanner thinks it is of another filetype. This causes the AV product to execute another branch of code (and hence logic) that can result in a complete bypass of the protector code necessary to detect the original malware.

The bug can affect multiple types of archive formats including ISO, ZIP and Bz2.

The manipulated archive can be unpacked at the client but not at the server level. An AV engine cannot extract an archive, but the user can. That is the crux of the problem. If AV can’t extract the archive, they have no idea if it is safe to run or not.

This “feature” is also a problem for AV clients if they are being run in an environment where files are not executed. That includes gateway products like fileservers, mail and webservers.

It took until 2017 for Zoller to once again sound the alarm about the problem at Cansecwest. The presentation served as a marker of what had been done by the AV vendors to that point about the problem --basically nothing. Even when notified by Zoller, they came up with reasons why that the vulnerability would not affect routine use.

Zoller says that “one vendor argued that this could not be called a vulnerability because it would not impact Integrity, Availability or Confidentiality. Another Vendor argued that this cannot pose a "risk" to their customers because of XYZ (assumptions).”

But in November 2019, Trustwave discovered that a normal but specially crafted ZIP file was being used in a phishing email to distribute the NanoCore Remote Access Trojan (RAT). The attachment would totally bypass the secured email gateway that was in use and showed as normal.

Uh-oh. Looks like Zoller was right. Things started to get fixed by the AV vendors.

Kaspersky ended up saying in its security advisory that, “We also have fixed three bugs in one of anti-virus (AV) engine components that is responsible for work with ZIP archives. The fix for this component corrects its behaviour in situation of antivirus scanning specially crafted ZIP archives. These malformed archives could be used to circumvent our antivirus scan process. The bugs affected Kaspersky products with antivirus databases.”

ESET’s advisory was more discreet, only saying that “Fixed unpacking of some malformed archives, reported by Thierry Zoller”.

Bitdefender and Avira seemed to have issued “silent” patches that improved the archive handling, but didn’t call attention to the long lag in mitigating the situation.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...