Vulnerabilities > CVE-2007-3971 - Unspecified vulnerability in Eset Software Nod32 Antivirus

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer overflow in ESET NOD32 Antivirus before 2.2289 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted ASPACK packed file, which triggers an infinite loop.

Vulnerable Configurations

Part Description Count
Application
Eset_Software
1

Nessus

NASL familyWindows
NASL idNOD32_2289.NASL
descriptionThe version of NOD32 installed on the remote host reportedly contains several problems with its run-time decompressors involving processing of
last seen2020-06-01
modified2020-06-02
plugin id25756
published2007-07-23
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/25756
titleNOD32 Antivirus Run-Time Decompressors Multiple Vulnerabilities
code
#
#  (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(25756);
  script_version("1.16");

  script_cve_id("CVE-2007-3970", "CVE-2007-3971", "CVE-2007-3972");
  script_bugtraq_id(24988);

  script_name(english:"NOD32 Antivirus Run-Time Decompressors Multiple Vulnerabilities");
  script_summary(english:"Checks version of NOD32 virus signature database");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an application that is affected by
multiple issues." );
 script_set_attribute(attribute:"description", value:
"The version of NOD32 installed on the remote host reportedly contains
several problems with its run-time decompressors involving processing
of '.CAB' files as well as 'ASPACK'- and 'FSB'-packed files.  If a
remote attacker can cause a malicious file to be scanned by the
affected application, these issues could be leveraged to crash the
affected application or to execute arbitrary code." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/Jul/421" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/Jul/422" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/Jul/423" );
 script_set_attribute(attribute:"see_also", value:"https://support.eset.com/"); # look for 'v.2289 (20070716)'
 script_set_attribute(attribute:"solution", value:
"Run NOD32's Update feature an ensure the version of the virus
signature database is at least v.2289." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2007/07/23");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/07/21");
 script_cvs_date("Date: 2018/11/15 20:50:27");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");

  script_dependencies("nod32_installed.nasl");
  script_require_keys("Antivirus/NOD32/installed", "Antivirus/NOD32/sigs");

  exit(0);
}


# Get the signature database update for the target.
sigs = get_kb_item("Antivirus/NOD32/sigs");
if (!sigs) exit(0);

matches = eregmatch(pattern:"^([0-9]+) \(([0-9]+)\)", string:sigs);
if (!isnull(matches)) update = int(matches[1]);
else exit(0);


# There's a problem if the update is before 2289.
if (update < 2289)
{
  report = string(
    "\n",
    "The current virus signature database update on the remote is : \n",
    "\n",
    "  ", sigs, "\n"
  );
  security_warning(port:get_kb_item("SMB/transport"), extra:report);
}