Cisco IronPort Appliances Sophos Anti-Virus Vulnerabilities (cisco-sa-20121108-sophos)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote device uses an antivirus program that is affected by
multiple vulnerabilities.

Description :

The remote Cisco IronPort appliance has a version of the Sophos
Anti-Virus engine that is 3.2.07.352_4.80 or earlier. It is,
therefore, reportedly affected by the following vulnerabilities :

- An integer overflow exists when parsing Visual Basic 6
controls.

- A memory corruption issue exists in the Microsoft CAB
parsers.

- A memory corruption issue exists in the RAR virtual
machine standard filters.

- A privilege escalation vulnerability exists in the
network update service.

- A stack-based buffer overflow issue exists in the PDF
file decrypter.

An unauthenticated, remote attacker could leverage these issues to
gain control of the system, escalate privileges, or cause a denial-of-
service.

See also :

https://lock.cmpxchg8b.com/sophailv2.pdf
http://www.sophos.com/en-us/support/knowledgebase/118424.aspx
http://www.nessus.org/u?9e995f86

Solution :

Update to Sophos engine version 3.2.07.363_4.83 as discussed in Cisco
Security Advisory cisco-sa-20121108-sophos.

Risk factor :

High / CVSS Base Score : 9.7
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:P)
CVSS Temporal Score : 8.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 70125 ()

Bugtraq ID: 56401

CVE ID: