[1][USEMAP:frame_r1_c1.gif] [frame_r1_c3.gif] [2]Japanese SNS Advisory [title2_r1_c1.gif] [3][GoIndex.gif] [4][GoBack.gif] 22 [5][GoNext.gif] [6]Japanese Edition SNS Advisory No.22 ViursBuster 2001 ver 8.01 Buffer Overflow Vulnerability Problem first discovered: 16 Jan 2001 Published: 7 Feb 2001 Last Updated: 7 Feb 2001 _________________________________________________________________ Overview: A vulnerability was found in the feature of virus scan for e-mail in Virus Buster 2001 from Trend Micro Inc. Problem Description: Virus Buster 2001 is a Japanese software package that has similar functions of PC-cillin 2000 such as eMail Virus Scanning and Browser Scanning. The feature of virus scan for e-mail in this software, called "eMail Virus Scanning" on PC-cillin, is used in order not to receive e-mail including virus by scanning every e-mail whenever MUA (Mail User Agent) imports e-mail by using POP3 protocol. The function is running as a proxy between MUA and MRA (Mail Retrieval Agent) as well. The buffer overflow occurs when MUA received email with the MIME Boundary defined in RFC 1341 including unusually long strings. As a result, the user of this software is not able to receive e-mail(s) anymore. An attacker could use this vulnerability to execute arbitrary commands. A restart of the computer is required in order to gain normal functionality. Example of Issue: From: ichinose@lac.co.jp To: ichinose@lac.co.jp Date: Tue, 30 Jan 2001 15:06:57 +0900 Subject: TEST Mime-Version: 1.0 Content-Type: MultiPart/Mixed;Boundary="aaa(about 300 characters)aaa" --aaa(about 300 characters)aaa Content-Type: text/plain; charset=iso-2022-jp body --aaa(about 300 characters)aaa Content-Type: application/octet-stream; name="aaa.exe" Content-Transfer-Encoding: base64 Content-Disposition: inline; filename="aaa.exe" --aaa(about 300 characters)aaa [22_1.gif] Fig1:the exapmle of exploit [22_2.gif] Fig2 : execution of arbitrary command (notepad.exe is excuted in this example) Tested Version of Virus Buster: Virus Buster 2001 Program Version 8.01 Tested on: Windows 2000 Professional(Japanese) Status of fixes: Due to prompt response by Trend Micro, the fixed version 8.02, was published on February 7th. You can update to Program Version 8.02 by using the feature of automatically updating software called Intelligent Update. If you have not updated your software since February 7th, you must upgrade to version 8.02 with Intelligent Update immediately. Required conditions for updating are: 1) using product version as registered user. 2) updating the software with Intelligent Update. (License key is necessary to do this.) Also, the Service Pack to fix this issue is available at: [7]http://www.trendmicro.co.jp/homeuser/download/vb2001sp2a.htm (Japanese only; the program will be updated to 8.02.) Vendor Information: Trend Micro Inc.: [8]http://www.trendmicro.com/ Trend Micro Inc.(Japan): [9]http://www.trendmicro.co.jp/ Disclaimer: All information in these advisories are subject to change without any advanced notices neither mutual consensus, and each of them is released as it is. LAC Co.,Ltd. is not responsible for any risks of occurrences caused by applying those information. _________________________________________________________________ Copyright(c) 1995-2002 Little eArth Corporation References 1. LYNXIMGMAP:http://www.lac.co.jp/security/english/snsadv_e/22_e.html#r1_c1Map 2. http://www.lac.co.jp/security/index.html 3. http://www.lac.co.jp/security/english/snsadv_e/index.html 4. http://www.lac.co.jp/security/english/snsadv_e/21_e.html 5. http://www.lac.co.jp/security/english/snsadv_e/23_e.html 6. http://www.lac.co.jp/security/intelligence/SNSAdvisory/22.html 7. http://www.trendmicro.co.jp/homeuser/download/vb2001sp2a.htm 8. http://www.trendmicro.com/ 9. http://www.trendmicro.co.jp/