Bitdefender antivirus for Linux multiple vulnerabilities

2009.04.13
Credit: iViZ
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-189


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

----------------------------------------------------------------------- [ iViZ Security Advisory 08-012 10/12/2008 ] ----------------------------------------------------------------------- iViZ Techno Solutions Pvt. Ltd. http://www.ivizsecurity.com ----------------------------------------------------------------------- * Title: Bitdefender antivirus for Linux multiple vulnerabilities. * Date: 10/12/2008 * Software: Bitdefender v7 for Linux --[ Synopsis: Multiple integer overflows were discovered in the GNU/Linux version of Bitdefender when analyzing corrupted PE binaries packed with neolite and asprotect packers. --[ Affected Software: * Bitdefender for GNU/Linux version 7.60825 and earlier. --[ Non Affected Software: * Bitdefender for GNU/Linux version after v7.60825 and newer. --[ Impact: Remote DoS, possibly remote code execution. --[ Final vendor response: * The vendor acknowledged the problems and fixed them in the latest versions of the product. --[ Credits: This vulnerability was discovered by Security Researcher Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd. --[ Disclosure timeline: * First private disclosure to vendor on September 19th 2008. * First vendor reply on September 19th 2008 : Without asking for any PoC, The BitDefender Support Team states that "This has been fixed in latest version". * September 19th 2008 : We manage to repeat crash with the updated version of the scanner. * September 19th 2008 : We send a PoC to the vendor. * September 23th 2008 : Vendor states "Yes, the issue was reproduced in the lab and it seems that was an engine problem." * September 24th 2008 : Problem fixed in latest version. --[ Reference: http://www.ivizsecurity.com/security-advisory.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top