[NEWS] HAURI Anti-Virus Directory Traversal
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 25 Aug 2005 12:00:43 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
HAURI Anti-Virus Directory Traversal
A directory traversal vulnerability in various HAURI anti-virus products,
can be exploited by malicious people to write files to arbitrary
* ViRobot Expert version 4.0
* ViRobot Advanced Server
* ViRobot Linux Server version 2.0
* HAURI LiveCall
The vulnerability is caused due to unsafe extraction of compressed
archives (e.g. ACE, ARJ, CAB, LZH, RAR, TAR and ZIP) into a temporary
directory before scanning. This can be exploited to write files into
arbitrary directories when scanning a malicious archive containing files
that have "/../" or "../../" directory sequences in their filenames.
Successful exploitation allows writing of files to arbitrary directories,
which can potentially lead to code execution (e.g. by overwriting certain
startup files), but requires that compressed file scanning is enabled.
The vendor has released a patch for ViRobot Linux Server 2.0:
The updated version of ViRobot Expert 4.0, ViRobot Advanced Server and
LiveCall are available via online update but they are still vulnerable
when scanning certain archive types.
30/06/2005 - Initial vendor notification.
12/07/2005 - Second vendor notification.
14/07/2005 - Vendor response.
08/08/2005 - Received notification that VR Expert and VR Advanced Server
has been fixed via online update.
09/08/2005 - Received notification that LiveCall has been fixed via online
11/08/2005 - Notified vendor that certain archive types are still
17/08/2005 - Vendor released patch for VR Linux Server and disclosed
19/08/2005 - Public disclosure.
The information has been provided by <mailto:email@example.com> Secunia
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.