From CAI's web site....
Vulnerability Information:
Computer Associates Int'l., Inc. has confirmed the presence of a Medium-Risk vulnerability
that affects the ability of eTrust EZ Antivirus to properly filter specially formatted .ZIP
files.
This vulnerability affects our decompression engine (Arclib.dll) which is embedded into the
following supported versions of eTrust EZ Antivirus and eTrust EZ Armor:
eTrust EZ Antivirus r6.1
eTrust EZ Antivirus r6.2
eTrust EZ Antivirus r6.3
eTrust EZ Armor r2
eTrust EZ Armor r2.3
eTrust EZ Armor r2.4
This vulnerability exists due to problems with the parsing of ZIP file format headers. The
file format for ZIP files specifies a both Local and a Global header. The Local Header is
in the beginning of the ZIP file and is before the compressed data and the Global Header is
att the end of the file. A specially crafted exploit can change the uncompressed file to a
size of zero in the ZIP header thus allowing it to bypass the scannera of some antivirus
software.
I received a document that indicates that McAfee also suffers from the same vulnerability as
Computer Associates eTrust but Trend and Symantec products are not vulnerable to this
exploit.
The following is my understanding for McAfee:
McAfee DAT v4397 provided an early protection for the exploit targeted specifically for
Gateway and Command Line Scans. McAfee DAT v4398 will flag a ZIP file using this exploit as
"Exploit-Zip Trojan".
Dave
| EZ Antivirus users should check this page:
|
|
http://crm.my-etrust.com/CIDocument.asp?KDId=2221&GUID=2466D695F1A64894B7F4A
| 94A727205BE
|
|
| (Careful of any link wrap)
|
|
|