A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].
References
Link | Resource |
---|---|
https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/ | Vendor Advisory |
https://lock.cmpxchg8b.com/sophailv2.pdf | Third Party Advisory |
https://community.sophos.com/kb/en-us/118424#six | Vendor Advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1286 | Exploit Third Party Advisory |
http://telussecuritylabs.com/threats/show/TSL20121207-01 | Third Party Advisory |
http://securitytracker.com/id?1027725 | Third Party Advisory |
https://security.gentoo.org/glsa/201708-05 | |
https://security.gentoo.org/glsa/201709-24 | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10205 | |
https://security.gentoo.org/glsa/201804-16 |
Information
Published : 2017-06-22 06:29
Updated : 2018-10-21 03:29
NVD link : CVE-2012-6706
Mitre link : CVE-2012-6706
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
rarlab
- unrar
sophos
- threat_detection_engine