Joined: 13 Jun 2003
Location: Dresden, Germany
|Posted: Fri Oct 29, 2004 1:20 pm Post subject: [ GLSA 200410-31 ] Archive::Zip: Virus detection evasion
|Gentoo Linux Security Advisory
Title: Archive::Zip: Virus detection evasion (GLSA 200410-31)
Date: October 29, 2004
Updated: May 22, 2006
Email virus scanning software relying on Archive::Zip can be fooled into
thinking a ZIP attachment is empty while it contains a virus, allowing
Archive::Zip is a Perl module containing functions to handle ZIP
Vulnerable: < 1.14
Unaffected: >= 1.14
Architectures: All supported architectures
Archive::Zip can be used by email scanning software (like amavisd-new)
to uncompress attachments before virus scanning. By modifying the
uncompressed size of archived files in the global header of the ZIP
file, it is possible to fool Archive::Zip into thinking some files
inside the archive have zero length.
An attacker could send a carefully crafted ZIP archive containing a
virus file and evade detection on some email virus-scanning software
relying on Archive::Zip for decompression.
There is no known workaround at this time.
All Archive::Zip users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-perl/Archive-Zip-1.14"
iDEFENSE Security Advisory 10.18.04
rt.cpan.org bug #8077
Last edited by GLSA on Thu Aug 05, 2010 4:17 am; edited 6 times in total