Advisory Details

December 12th, 2006

Sophos Anti-Virus SIT Archive Parsing Buffer Overflow Vulnerability

ZDI-06-046
ZDI-CAN-091

CVE ID CVE-2006-6335
CVSS SCORE
AFFECTED VENDORS Sophos
AFFECTED PRODUCTS Sophos Anti-Virus
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['4917']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Anti-Virus.

The specific flaw exists in the parsing of SIT archives. When a long non-null terminated filename is processed by veex.dll, a heap overflow occurs due to the miscalculation of the string's actual size. Exploitation is possible leading to remote code execution running under the SYSTEM context.

ADDITIONAL DETAILS Sophos has issued an update to correct this vulnerability. More details can be found at:
http://www.sophos.com/support/knowledgebase/article/21637.html
DISCLOSURE TIMELINE
  • 2006-09-14 - Vulnerability reported to vendor
  • 2006-12-12 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES