Check Point Reference: | CPAI-2005-198 |
Date Published: | 9 Mar 2010 |
Severity: | High |
Last Updated: | Tuesday 28 January, 2014 |
Source: | |
Industry Reference: | CVE-2005-0533 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | TrendMicro provides several anti-virus (AV) scanning products for home use as well as gateway AV scanners. The AV scanner product line has the ability to decode several archived file formats when scanning file contents for viruses. All scanner products are based on scanning engines implemented as system driver modules. The virus scanning engines employ decompression modules to decompress archives before scanning the files contained inside the archive. One of such archive formats recognized by the affected products is the ARJ format. This archiving format allows for simple storage of multiple files in one archive as well as the compression of the stored files. The Trend Micro scanning engine can decode many file formats to detect malware including the ARJ file format. There is a vulnerability in the way the product parses the main header and local header file names in an ARJ archive. An overly long name in either field can overrun a buffer, triggering a buffer overflow. An attacker can send a crafted ARJ file to the target system. If the target contains automatic scanning, the vulnerability can be triggered without user intervention (e.g., e-mail scanning) or with some user intervention (e.g., downloading from FTP site). In a simple attack, after scanning the crafted ARJ archive a vulnerable system will exhibit some instability. On some systems a system-wide locking-up prevents further operation on the target until the system is restarted. On some systems the virus scan engine no longer responds to scanning request. If attacker is successful in injecting and executing supplied code, and the target behavior is dependent on the nature and intent of the injected code. The code is executed with root or system level privileges. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Trend Micro Products AntiVirus Library buffer overflow