Sophos Anti-Virus < 10.0.9 / 10.2.1 Multiple Vulnerabilities

high Nessus Plugin ID 62948

Synopsis

The remote Windows host has an antivirus application that is affected by multiple vulnerabilities.

Description

According to its version number, the Sophos Anti-Virus installation on the remote Windows host is affected by multiple vulnerabilities :

- An integer overflow exists when parsing Visual Basic 6 controls.

- An ASLR bypass exists in 'sophos_detoured_x64.dll'.

- A universal cross-site scripting vulnerability exists in the template for the LSP block page.

- A memory corruption issue exists in the Microsoft CAB parsers.

- A memory corruption issue exists in the RAR virtual machine standard filters.

- A privilege escalation vulnerability exists in the network update service.

- A stack-based buffer overflow issue exists in the PDF file decrypter.

Solution

Upgrade to Sophos Anti-Virus version 10.0.9 / 10.2.1 or later.

See Also

https://lock.cmpxchg8b.com/sophailv2.pdf

http://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/

http://www.sophos.com/en-us/support/knowledgebase/118424.aspx

Plugin Details

Severity: High

ID: 62948

File Name: sophos_10_0_9.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 11/16/2012

Updated: 8/8/2018

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

CPE: cpe:/a:sophos:sophos_anti-virus

Required KB Items: Antivirus/Sophos/installed, Antivirus/Sophos/prod_ver

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/5/2012

Vulnerability Publication Date: 11/5/2012

Reference Information

BID: 56401

CERT: 662243