search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple vendor implementations of file scanning utilities vulnerable to DoS via compressed file archive

Vulnerability Note VU#212707

Original Release Date: 2002-08-05 | Last Revised: 2002-10-02

Overview

Several file scanning utilities, including some virus scanners, may fail and crash when scanning compressed file archives.

Description

Many file scanners will decompress compressed file archives in memory so their contents can be scanned. However, some of these scanners do not check if there is enough memory available to decompress the file.

The Zip compression algorithm allows a maximum compression ratio of 1000:1, and with nested Zip archives, it is possible to create a small archive that would decompress to a size several thousands of times greater, and much greater than the memory available on most systems.

When a file scanner tries to decompress such an archive without ensuring that there is enough memory available, it may fail and crash. As file scanners are sometimes used to scan message attachments on mail servers, this problem could have additional negative effects on the services provided by mail servers.

Impact

Attackers can design a file which will crash a file scanner and possibly cause additional problems for mail servers that employ file scanners.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

None.

Vendor Information

212707
 

View all 13 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Michel Arboi for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

CVE IDs: None
Severity Metric: 4.39
Date Public: 2002-07-16
Date First Published: 2002-08-05
Date Last Updated: 2002-10-02 15:47 UTC
Document Revision: 9

Sponsored by CISA.