armadito-av
armadito-av copied to clipboard
potential vulnerability in database file download
A first version of the vulnerability was described in: http://seclists.org/fulldisclosure/2016/Jun/69
Using a \u JSON escape, a crafted database index may potentially specify a file path pointing at arbitrary location on the file system of the machine running the armadito database update agent. Fix of issue #53 (patch for above vulnerability) must be checked against JSON escape sequences. Full fix is:
- run update agent in a separate process with low priviledges
- run update agent in a chroot() on linux
In both case, update agent must notify the scan service of database update.