[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] Panda Remote Heap Overflow
From: list () rem0te ! com
Date: 2005-11-29 16:01:42
Message-ID: W799731508225861133280102 () webmail4
[Download RAW message or body]
Date
November 29, 2005
Vulnerability
The Panda Antivirus Library provides file format support for virus analysis. During \
decompression of ZOO files Panda is vulnerable to a heap overflow allowing attackers complete \
control of the system(s) being protected. This vulnerability can be exploited remotely without \
user interaction in default configurations through common protocols such as SMTP.
Impact
Successful exploitation of Panda protected systems allows attackers unauthorized control of \
data and related privileges. It also provides leverage for further network compromise. Panda \
implementations are likely vulnerable in their default configuration.
Affected Products
Due to the library's modular design and core functionality: it is likely this vulnerability \
affects a substantial portion of Panda's gateway, server, and client antivirus enabled product \
lines on most platforms.
http://www.pandasoftware.com/
Note: this library is also licensed to other venders with implementations that are likely \
affected, refer to Panda for specifics.
Details
http://www.rem0te.com/public/images/panda.pdf
Credit
This vulnerability was discovered and researched by Alex Wheeler.
Contact
security@rem0te.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic