Short Name |
SMTP:EXPLOIT:BITDEF-LOG |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
BitDefender Antivirus Logging Function Format String Vulnerability |
Release Date |
2011/07/05 |
Update Number |
1949 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
There exists a format string vulnerability in BitDefender Antivirus product. The flaw is caused by improper validation of file names when printing logging information. By delivering files with crafted names to a vulnerable target, a remote attacker may leverage this vulnerability to bypass the detection for further attacks or execute arbitrary code. An unsuccessful attack will cause the current scanning process to terminate unexpectedly, the functionality of the Anti-Virus product as a whole will not be affected. The AV application will not produce any log entries as a result of its unexpected termination. The attacker may utilize this issue to bypass the scanning of a known virus file when the Scan accessed files option in the AV application setting is disabled. A successful attack aiming at code injection and execution will divert the process flow of the vulnerable application. This will result in arbitrary code execution. The behaviour of the target system as a result of such an attack is dependent on the intention of the injected code.
BitDefender Antivirus is a proprietary antivirus product for multiple platforms. A format string vulnerability affects the logging functionality of BitDefender Antivirus. This issue is due to a failure of the application to properly sanitize user-supplied input prior to passing it as the format specifier to a formatted printing function. A remote attacker may leverage this issue to write to arbitrary process memory, facilitating code execution, and privilege escalation. This issue was reported in BitDefender versions 7.2, 8, and 9 for Windows. Other versions and platforms may also be affected.