Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Windows Net Apps :: wsecur.htm

Worldsecure/Mail 4.3 - disabling virus scanning



Vulnerability

    Worldsecure/Mail

Affected

    Worldsecure/Mail 4.3

Description

    Andreas Kuechler found following.  Worldsecure uses anonymous  ftp
    to transfer  their virus  patterns automatically  from their  site
    download.worldtalk.com  to  the  Worldsecure  server.    Obviously
    Worldtalk does  __NOT__ check  any signatures  after the  file has
    been downloaded and integrates  them into the antivirus  engine of
    the WorldSecure/Mail server.  There are two scenarios:

    1) if   anyone   gets   access    to   the   pattern   files    on
       download.worldtalk.com  and  replaces  them  with  a   modified
       version:
       a) he  can  transport  any  file  named  *.dat  to  the   users
          worldsecure server (the server transports everything  called
          *.dat that  is embeded  inside the  dat-xxxx.zip residing on
          the ftp server to  a directory under Worldtalk  called after
          the pattern  revision. All  you have  to do  is to  find the
          actual revision  number of  mcafees dat-files,  add one  and
          place a new dat on the  ftp server. By doing this you  reach
          __ANY__ WS/Mail-server with enabled autoupdate feature!

       b) by  replacing scan.dat  with any  file which  is not a virus
          pattern the  virus engine  will be  unable to  scan for  any
          viruses any more...  By the way wherent there some  exploits
          against MS FTP Service 4.0 !?!

    2) if   anyone  gets   access  to   the  local   registry  of    a
       worldsecure/Mail server  he can  modify the  download site from
       where worldtalk retrieves its  updates.  He can  then acomplish
       the same  thing as  before. (only  on the  smaller scope of one
       server)

    The big problem is that the Worldsecure/Mail server uses any  file
    as virus  pattern and  actually scans  with this  modified file (I
    tried wincmd.exe  !!! renamed  as scan.dat)  without producing any
    warnings or log entries.   The administrator has only a  chance to
    smell the mess when he restarts the server because then the  virus
    engine will not initialize.

Solution

    Worldtalk has been informed  about this scenarios and  admits that
    there is a  problem which will  be solved in  a future release  of
    Worldsecure/Mail.

    Blindly trusting an outside source to update virus
    pattern/definition/dat files  (or any  other app)  throughout your
    enterprise is foolish.   Corporations should have  a mechanism  to
    test  new  updates  before  they  are  released  to  the   general
    server/user population.   This is a  simple way to  minimise these
    types  of  security  risks.   Also,  you  won't  have to deal with
    thousands  of  users  calling  your  help  desk reporting their AV
    software didn't load  properly or is  detecting explorer.exe as  a
    trojan horse!


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH