Check Point Reference: | CPAI-2005-306 |
Date Published: | 2 Dec 2009 |
Severity: | Critical |
Last Updated: | Sunday 14 February, 2016 |
Source: | |
Industry Reference: | CVE-2005-3142 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | The Kaspersky Anti-Virus (AV) scanner products include client, gateway and server AV product lines. The AV scanners share numerous file handling libraries that allow them to process files in the context of their types. An example of the added functionality that such a system provides is archive content scanning. The Kaspersky AV scanners are capable of scanning inside archives of numerous types, such as ARJ, ZIP and cabinet files (CAB). There exists a heap-based buffer overflow vulnerability in the Kaspersky Antivirus library. The vulnerability is caused by insufficient boundary checks of user supplied data when processing CAB format archives. This issue can be remotely exploited to execute arbitrary code on the target system. A simple buffer overflow attack will terminate the antivirus service, creating a denial-of-service of the antivirus protection on the target system. In a case of a successful code injection attack, arbitrary code may be injected and executed on the target system. The behaviour of the target system is dependent on the intent of the malicious code. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Security Products Enforcement Violation.
Attack Information: Kaspersky Antivirus library heap buffer overflow