Release mode : Coordinated Disclosure
Ref : [TZO-05-2020] - Kaspersky Generic Archive Bypass (ZIP Compressed Size)
Vendor : Kaspersky
Status : Patched
CVE : Unknown
Disclosure Policy: https://caravelahq.com/b/policy/20949
Blog : https://blog.zoller.lu
Vendor Advisory : https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219
Affected Products
The issue affected Secure Connection product and consumer products in those it is incorporated:
Kaspersky Secure Connection prior to version 4.0 (2020) patch E.
Kaspersky Internet Security prior to version 2020 patch E.
Kaspersky Total Security prior to version 2020 patch E.
Kaspersky Security Cloud prior to version 2020 patch E.
Fixed versions
Kaspersky Secure Connection 4.0 (2020) patch E.
Kaspersky Internet Security 2020 patch E.
Kaspersky Total Security 2020 patch E.
Kaspersky Security Cloud 2020 patch E.
III. Impact
Impacts depends on the contextual use of the product and engine within the organisation of a customer. Gateway Products (Email, HTTP Proxy etc) may allow the file through unscanned and give it a clean bill of health. Server side AV software will not be able to discover any code or sample contained within this ISO file and it will not raise suspicion even if you know exactly what you are looking for (Which is for example great to hide your implants or Exfiltration/Pivot Server).
Update to the respective available versions as found at
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219
Thanks to Kaspersky for coordinating this vulnerability.