Description
Kaspersky Lab has identified that the below mentioned products are susceptible to memory corruptions while scanning malformed files of RAR and ZIP formats. These vulnerabilities have maximum security impact of remote code execution and could corrupt memory this way: an attacker could execute arbitrary code in the context of the Antivirus process. In order to exploit the vulnerabilities an attacker has to convince user to upload a maliciously malformed ZIP or RAR file from external resources. This, for example, might be done by convincing a user to download a malicious file from a specially crafted website or by sending them a malicious file via e-mail. Memory corruptions can possibly occur while scanning this file. The fix addresses the vulnerabilities by modifying processing of malformed RAR and ZIP files.
List of affected products
Kaspersky Anti-Virus for Lotus Domino: 8.2
Kaspersky Linux Mail Security: 8.0, 8.0.1
Kaspersky Security for Mail Gateway:1.0
Kaspersky Anti-Virus for Proxy Server: 5.5
Kaspersky Security for Virtualization Agentless: 1.1.0.79, 2.0.0.34, 2.0.0.69, 3.0.0.92, 3.1.0.77
Kaspersky Anti-Virus: 2013, 2014, 2015
Kaspersky Internet Security: 2013, 2014, 2015
Kaspersky PURE 3
Kaspersky Small Office Security 3
Kaspersky Endpoint Security for Windows: 10 , 10 MR1, 10 SP1
Kaspersky Endpoint Security for Windows: 8, 8 CF1, 8 CF2
Kaspersky Anti-Virus 6.0 R2 for Windows Workstations: 6 MP4 CF1 and CF2
Kaspersky Security for SharePoint Server: 8.0 mp1, 8.0 mp1cf1, 9.0, 9.0 mp1, 9.0
Kaspersky Security for Microsoft Exchange Server: 8.3, 8.6.79, 9.0.129, 9.1.42, 9.2.39
Kaspersky Anti-Virus for Lotus Domino: 8.2
Kaspersky Anti-Virus for Windows Servers EE: 8 TR, SP1, SP2, 10
Kaspersky Anti-Virus for Linux File Servers: 8.0.1.145, 8.0.2.256, 8.0.2.256, 8.0.3.265
Kaspersky Endpoint Security for Linux: 8.0.0.35, 8.1.0.50
Fixed Versions
The fix is included in the autoupdated modules that were released on 13 November, 2015 for all the products listed above.
Acknowledgments
We would like to extend our thanks to Tavis Ormandy for reporting these bugs to Kaspersky Lab.