New issue
Advanced search Search tips
Starred by 1 user
Status: Fixed
Owner:
Closed: Mar 2016
Cc:



Sign in to add a comment
Comodo: PackMan unpacker insufficient parameter validation
Project Member Reported by taviso@google.com, Mar 14 2016 Back to list
Packman is an obscure opensource executable packer that Comodo Antivirus attempts to unpack during scanning. The code is available online here:

http://packmanpacker.sourceforge.net/

If the compression method is set to algorithm 1, compression parameters are read directly from the input executable without validation. Fuzzing this unpacker revealed a variety of crashes due to this, such as causing pointer arithmetic in CAEPACKManUnpack::DoUnpack_With_NormalPack to move pksDeCodeBuffer.ptr to an arbitrary address, which allows an attacker to free() an arbitrary pointer.

This issue is obviously exploitable to execute code as NT AUTHORITY\SYSTEM.

The attached testcase will attempt to free() an invalid pointer to demonstrate this.


This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.

 
PackMan.zip
198 KB Download
Project Member Comment 1 by taviso@google.com, Mar 22 2016
Labels: -Restrict-View-Commit -Vendor-Comodo -Product-Comodo Vendor-comodo Product-comodo
Status: Fixed
This is resolved in the latest update.
Sign in to add a comment