Vulnerability CVE-2014-1213


Published: 2014-02-10   Modified: 2014-02-11

Description:
Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Sophos Anti-Virus Denial Of Service
Graham Sutherlan...
04.02.2014

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:P/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.6/10
7.8/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Complete
Affected software
Sophos -> Scanning engine 
Sophos -> Sophos anti-virus 

 References:
http://packetstormsecurity.com/files/125024/Sophos-Anti-Virus-Denial-Of-Service.html
http://seclists.org/fulldisclosure/2014/Feb/1
http://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1213/
http://www.securityfocus.com/archive/1/530915/100/0/threaded
http://www.securityfocus.com/bid/65286
http://www.securitytracker.com/id/1029713
http://www.sophos.com/en-us/support/knowledgebase/2300/7200/1031/120401.aspx

Copyright 2024, cxsecurity.com

 

Back to Top