Vigil@nce - VirusScan Enterprise: bypassing BOP
December 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use the BOP feature of VirusScan Enterprise, in
order to ease the development of an exploit for a vulnerability in
a software protected by BOP.
Impacted products: VirusScan.
Severity: 1/4.
Creation date: 09/12/2015.
DESCRIPTION OF THE VULNERABILITY
The VirusScan Enterprise product offers the BOP (Buffer Overflow
Protection) feature.
However, this feature allocates memory with RWX permissions at a
predictable address in the memory space of the protected process.
This thus eases the development of an exploit for a vulnerability
in this process.
An attacker can therefore use the BOP feature of VirusScan
Enterprise, in order to ease the development of an exploit for a
vulnerability in a software protected by BOP.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/VirusScan-Enterprise-bypassing-BOP-18482