All the vulnerabilites related to f-secure - anti-virus
cve-2013-7369
Vulnerability from cvelistv5
Published
2014-04-18 14:00
Modified
2024-09-17 00:26
Severity ?
Summary
SQL injection vulnerability in an unspecified DLL in the FSDBCom ActiveX control in F-Secure Anti-Virus for Microsoft Exchange Server before HF02, Anti-Virus for Windows Servers 9.00 before HF09, Anti-Virus for Citrix Servers 9.00 before HF09, and F-Secure Email and Server Security and F-Secure Server Security 9.20 before HF01 allows remote attackers to execute arbitrary SQL commands via unknown vectors, related to GetCommand.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.556Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-13-095/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/en/web/labs_global/fsc-2013-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in an unspecified DLL in the FSDBCom ActiveX control in F-Secure Anti-Virus for Microsoft Exchange Server before HF02, Anti-Virus for Windows Servers 9.00 before HF09, Anti-Virus for Citrix Servers 9.00 before HF09, and F-Secure Email and Server Security and F-Secure Server Security 9.20 before HF01 allows remote attackers to execute arbitrary SQL commands via unknown vectors, related to GetCommand."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-04-18T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-13-095/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/en/web/labs_global/fsc-2013-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in an unspecified DLL in the FSDBCom ActiveX control in F-Secure Anti-Virus for Microsoft Exchange Server before HF02, Anti-Virus for Windows Servers 9.00 before HF09, Anti-Virus for Citrix Servers 9.00 before HF09, and F-Secure Email and Server Security and F-Secure Server Security 9.20 before HF01 allows remote attackers to execute arbitrary SQL commands via unknown vectors, related to GetCommand."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-13-095/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-13-095/"
            },
            {
              "name": "http://www.f-secure.com/en/web/labs_global/fsc-2013-1",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/en/web/labs_global/fsc-2013-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7369",
    "datePublished": "2014-04-18T14:00:00Z",
    "dateReserved": "2014-04-18T00:00:00Z",
    "dateUpdated": "2024-09-17T00:26:14.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1425
Vulnerability from cvelistv5
Published
2010-04-15 21:12
Modified
2024-09-17 02:41
Severity ?
Summary
F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection.
References
http://www.securitytracker.com/id?1023841vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1023842vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1023843vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/39396third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/0855vdb-entry, x_refsource_VUPEN
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.htmlx_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:21:19.158Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1023841",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023841"
          },
          {
            "name": "1023842",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023842"
          },
          {
            "name": "1023843",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023843"
          },
          {
            "name": "39396",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39396"
          },
          {
            "name": "ADV-2010-0855",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0855"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-04-15T21:12:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1023841",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023841"
        },
        {
          "name": "1023842",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023842"
        },
        {
          "name": "1023843",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023843"
        },
        {
          "name": "39396",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39396"
        },
        {
          "name": "ADV-2010-0855",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0855"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1425",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1023841",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023841"
            },
            {
              "name": "1023842",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023842"
            },
            {
              "name": "1023843",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023843"
            },
            {
              "name": "39396",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39396"
            },
            {
              "name": "ADV-2010-0855",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0855"
            },
            {
              "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1425",
    "datePublished": "2010-04-15T21:12:00Z",
    "dateReserved": "2010-04-15T00:00:00Z",
    "dateUpdated": "2024-09-17T02:41:53.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-6646
Vulnerability from cvelistv5
Published
2014-04-18 14:00
Modified
2024-09-16 23:40
Severity ?
Summary
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:01.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/en/web/labs_global/fsc-2012-2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-04-18T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/en/web/labs_global/fsc-2012-2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6646",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.f-secure.com/en/web/labs_global/fsc-2012-2",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/en/web/labs_global/fsc-2012-2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6646",
    "datePublished": "2014-04-18T14:00:00Z",
    "dateReserved": "2014-04-18T00:00:00Z",
    "dateUpdated": "2024-09-16T23:40:49.051Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-1782
Vulnerability from cvelistv5
Published
2009-05-22 20:00
Modified
2024-08-07 05:27
Severity ?
Summary
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive.
References
http://secunia.com/advisories/35008third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1022172vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2009/1262vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1022170vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/50346vdb-entry, x_refsource_XF
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/34849vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1022171vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:27:54.272Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35008",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35008"
          },
          {
            "name": "1022172",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022172"
          },
          {
            "name": "ADV-2009-1262",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1262"
          },
          {
            "name": "1022170",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022170"
          },
          {
            "name": "fsecure-rar-zip-security-bypass(50346)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html"
          },
          {
            "name": "34849",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34849"
          },
          {
            "name": "1022171",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022171"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35008",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35008"
        },
        {
          "name": "1022172",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022172"
        },
        {
          "name": "ADV-2009-1262",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1262"
        },
        {
          "name": "1022170",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022170"
        },
        {
          "name": "fsecure-rar-zip-security-bypass(50346)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html"
        },
        {
          "name": "34849",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34849"
        },
        {
          "name": "1022171",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022171"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1782",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35008",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35008"
            },
            {
              "name": "1022172",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022172"
            },
            {
              "name": "ADV-2009-1262",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1262"
            },
            {
              "name": "1022170",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022170"
            },
            {
              "name": "fsecure-rar-zip-security-bypass(50346)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346"
            },
            {
              "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html"
            },
            {
              "name": "34849",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34849"
            },
            {
              "name": "1022171",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022171"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1782",
    "datePublished": "2009-05-22T20:00:00",
    "dateReserved": "2009-05-22T00:00:00",
    "dateUpdated": "2024-08-07T05:27:54.272Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-1430
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-09-16 19:56
Severity ?
Summary
The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:37.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\19\\04\\00\\10 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-03-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1430",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\19\\04\\00\\10 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1430",
    "datePublished": "2012-03-21T10:00:00Z",
    "dateReserved": "2012-02-29T00:00:00Z",
    "dateUpdated": "2024-09-16T19:56:25.252Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-3499
Vulnerability from cvelistv5
Published
2012-08-22 10:00
Modified
2024-09-16 20:22
Severity ?
Summary
F-Secure Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution. NOTE: the researcher indicates that a vendor response was received, stating that "the inability to catch these files are caused by lacking functionality rather than programming errors."
References
http://www.securityfocus.com/archive/1/514356mailing-list, x_refsource_BUGTRAQ
http://www.n00bz.net/antivirus-cvex_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:11:44.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20101018 Antivirus detection after malware execution",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/514356"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.n00bz.net/antivirus-cve"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "F-Secure Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution.  NOTE: the researcher indicates that a vendor response was received, stating that \"the inability to catch these files are caused by lacking functionality rather than programming errors.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-22T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20101018 Antivirus detection after malware execution",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/514356"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.n00bz.net/antivirus-cve"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3499",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F-Secure Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution.  NOTE: the researcher indicates that a vendor response was received, stating that \"the inability to catch these files are caused by lacking functionality rather than programming errors.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20101018 Antivirus detection after malware execution",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/514356"
            },
            {
              "name": "http://www.n00bz.net/antivirus-cve",
              "refsource": "MISC",
              "url": "http://www.n00bz.net/antivirus-cve"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3499",
    "datePublished": "2012-08-22T10:00:00Z",
    "dateReserved": "2010-09-24T00:00:00Z",
    "dateUpdated": "2024-09-16T20:22:12.136Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2014-04-18 14:55
Modified
2024-11-21 02:00
Severity ?
Summary
SQL injection vulnerability in an unspecified DLL in the FSDBCom ActiveX control in F-Secure Anti-Virus for Microsoft Exchange Server before HF02, Anti-Virus for Windows Servers 9.00 before HF09, Anti-Virus for Citrix Servers 9.00 before HF09, and F-Secure Email and Server Security and F-Secure Server Security 9.20 before HF01 allows remote attackers to execute arbitrary SQL commands via unknown vectors, related to GetCommand.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:9.00:*:*:*:*:citrix_servers:*:*",
              "matchCriteriaId": "0A5F5F9D-61C0-4ADE-94C6-5C23B37DC42E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:9.00:*:*:*:*:exchange_server:*:*",
              "matchCriteriaId": "7AD36F65-10CC-431A-94B9-FA3800297383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:9.00:*:*:*:*:windows_server:*:*",
              "matchCriteriaId": "C6F17A1F-616E-48FD-A8C7-7B95F5530CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:9.10:*:*:*:*:exchange_server:*:*",
              "matchCriteriaId": "87E8E004-614E-4B8A-A218-00905842AC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:email_and_server_security:9.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B229B4C-BE77-4477-8AE7-A3F03069CC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:server_security:9.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "12037257-81B4-460F-A0AA-067B365D8EF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in an unspecified DLL in the FSDBCom ActiveX control in F-Secure Anti-Virus for Microsoft Exchange Server before HF02, Anti-Virus for Windows Servers 9.00 before HF09, Anti-Virus for Citrix Servers 9.00 before HF09, and F-Secure Email and Server Security and F-Secure Server Security 9.20 before HF01 allows remote attackers to execute arbitrary SQL commands via unknown vectors, related to GetCommand."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en una DLL no especificada en el control FSDBCom ActiveX en F-Secure Anti-Virus para Microsoft Exchange Server anterior a HF02, Anti-Virus para Windows Servers 9.00 anterior a HF09, Anti-Virus para Citrix Servers 9.00 anterior a HF09, y F-Secure Email y Server Security y F-Secure Server Security 9.20 anterior a HF01 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores desconocidos, relacionado con GetCommand."
    }
  ],
  "id": "CVE-2013-7369",
  "lastModified": "2024-11-21T02:00:51.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-04-18T14:55:25.870",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en/web/labs_global/fsc-2013-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-13-095/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en/web/labs_global/fsc-2013-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-13-095/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-22 10:42
Modified
2024-11-21 01:18
Severity ?
Summary
F-Secure Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution. NOTE: the researcher indicates that a vendor response was received, stating that "the inability to catch these files are caused by lacking functionality rather than programming errors."
Impacted products
Vendor Product Version
f-secure anti-virus -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7E28F5D-611B-44F3-9FB3-3E1C97EABE96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "F-Secure Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution.  NOTE: the researcher indicates that a vendor response was received, stating that \"the inability to catch these files are caused by lacking functionality rather than programming errors.\""
    },
    {
      "lang": "es",
      "value": "F-Secure Anti-Virus no interact\u00faa adecuadamente con el procesado de URLs hcp:// URLs debido a la ayuda y al centro de soporte de Microsoft, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos ejecutar c\u00f3digo a trav\u00e9s de malware que es detectado correctamente por este producto, pero con un enfoque de detecci\u00f3n que se produce demasiado tarde como para detener la ejecuci\u00f3n de c\u00f3digo. NOTA: \"La incapacidad para atrapar a estos archivos son causados ??por carecer de funcionalidad en lugar de errores de programaci\u00f3n\""
    }
  ],
  "id": "CVE-2010-3499",
  "lastModified": "2024-11-21T01:18:52.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-22T10:42:04.180",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.n00bz.net/antivirus-cve"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/514356"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.n00bz.net/antivirus-cve"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/514356"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-05-22 20:30
Modified
2024-11-21 01:03
Severity ?
Summary
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:linux_servers:*:*:*:*:*",
              "matchCriteriaId": "5AE96CC9-08DC-49F0-94C4-89810D8BFE01",
              "versionEndIncluding": "4.65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:inux_client_security:*:*:*:*:*",
              "matchCriteriaId": "8651DBB2-EC4B-474E-8431-CD7252AC4862",
              "versionEndIncluding": "5.54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:linux_server_security:*:*:*:*:*",
              "matchCriteriaId": "BD9FDABD-6F42-47E3-8424-559D5DD46EF3",
              "versionEndIncluding": "5.54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:mime_sweeper:*:*:*:*:*",
              "matchCriteriaId": "2012AC4D-0F75-4389-9165-28930368AE4D",
              "versionEndIncluding": "5.61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "AB4ED58A-B715-467B-A463-FB0BA3653FA2",
              "versionEndIncluding": "6.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:citrix_servers:*:*:*:*:*",
              "matchCriteriaId": "863CFFAF-FD5B-4150-A063-CB2851D689BF",
              "versionEndIncluding": "7.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "29A9B0A7-FFB2-460B-8BCB-1C7D9DD55A15",
              "versionEndIncluding": "7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "EC9E56D7-C642-46FB-8425-A3A7F22B62D2",
              "versionEndIncluding": "7.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:windows_server:*:*:*:*:*",
              "matchCriteriaId": "E829D765-4473-4D6E-AA51-7EC44CB09A2C",
              "versionEndIncluding": "8.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:workstations:*:*:*:*:*",
              "matchCriteriaId": "ECE7F2A4-E673-4B59-BAC2-B3D01AD0E1A9",
              "versionEndIncluding": "8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "732265B4-ED48-4C91-8C96-4E2A8D0DB105",
              "versionEndIncluding": "2009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1D2491-0097-40BA-9B35-AA0708A822BC",
              "versionEndIncluding": "8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:home_server_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F7894C-9891-4E09-BE4B-DCA045361D32",
              "versionEndIncluding": "2009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux:*:*:*:*:*",
              "matchCriteriaId": "A0941F91-C6FF-492B-908C-51C46D373BB9",
              "versionEndIncluding": "2.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux_japanese:*:*:*:*:*",
              "matchCriteriaId": "C8E837C1-A444-4573-8F8E-4488D2917BD4",
              "versionEndIncluding": "3.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:windows:*:*:*:*:*",
              "matchCriteriaId": "06B35ABF-C401-4DF4-9935-55E797E60220",
              "versionEndIncluding": "6.61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECC7480-20F5-453B-A417-BB2B7BD198E4",
              "versionEndIncluding": "2009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD234E72-8306-4262-A12A-1B5E18B34E90",
              "versionEndIncluding": "7.01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "162C76E3-5AB6-4C72-A47A-F2820ED8BF46",
              "versionEndIncluding": "7.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples productos antivirus F-Secure, incluidos: Anti-Virus for Microsoft Exchange v7.10 y anteriores; Internet Gatekeeper for Windows v6.61 y anteriores, Windows v6.61 y anteriores, y Linux v2.16 y anteriores; Internet Security 2009 y anteriores, Anti-Virus 2009 y anteriores, Client Security v8.0 y anteriores y otros; permiten a atacantes remotos saltar la detecci\u00f3n de software malicioso mediante archivos (1) .ZIP y (2) .RAR manipulados."
    }
  ],
  "id": "CVE-2009-1782",
  "lastModified": "2024-11-21T01:03:21.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-05-22T20:30:00.877",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35008"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34849"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022171"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022172"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1262"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34849"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-04-15 21:30
Modified
2024-11-21 01:14
Severity ?
Summary
F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection.
Impacted products
Vendor Product Version
f-secure anti-virus *
f-secure anti-virus 6.62
f-secure anti-virus 7.0
f-secure anti-virus 7.10
f-secure f-secure_anti-virus *
f-secure f-secure_anti-virus *
f-secure f-secure_anti-virus *
f-secure f-secure_anti-virus 2.16
f-secure f-secure_anti-virus 2.16
f-secure f-secure_anti-virus 4.50
f-secure f-secure_anti-virus 4.50
f-secure f-secure_anti-virus 4.50_hotfix_1
f-secure f-secure_anti-virus 4.50_hotfix_1
f-secure f-secure_anti-virus 4.50_hotfix_2
f-secure f-secure_anti-virus 4.50_hotfix_2
f-secure f-secure_anti-virus 4.51
f-secure f-secure_anti-virus 4.51
f-secure f-secure_anti-virus 4.51
f-secure f-secure_anti-virus 4.51
f-secure f-secure_anti-virus 4.51_hotfix_2
f-secure f-secure_anti-virus 4.51_hotfix_2
f-secure f-secure_anti-virus 4.52
f-secure f-secure_anti-virus 4.52
f-secure f-secure_anti-virus 4.52
f-secure f-secure_anti-virus 4.52
f-secure f-secure_anti-virus 4.52
f-secure f-secure_anti-virus 4.60
f-secure f-secure_anti-virus 4.60
f-secure f-secure_anti-virus 4.61
f-secure f-secure_anti-virus 4.61
f-secure f-secure_anti-virus 4.61
f-secure f-secure_anti-virus 4.62
f-secure f-secure_anti-virus 4.62
f-secure f-secure_anti-virus 4.64
f-secure f-secure_anti-virus 4.64
f-secure f-secure_anti-virus 4.64
f-secure f-secure_anti-virus 4.65
f-secure f-secure_anti-virus 4.65
f-secure f-secure_anti-virus 4.65
f-secure f-secure_anti-virus 5.0
f-secure f-secure_anti-virus 5.0
f-secure f-secure_anti-virus 5.0
f-secure f-secure_anti-virus 5.0.2
f-secure f-secure_anti-virus 5.01
f-secure f-secure_anti-virus 5.01
f-secure f-secure_anti-virus 5.01
f-secure f-secure_anti-virus 5.2.1
f-secure f-secure_anti-virus 5.3.0
f-secure f-secure_anti-virus 5.5
f-secure f-secure_anti-virus 5.5
f-secure f-secure_anti-virus 5.5
f-secure f-secure_anti-virus 5.5
f-secure f-secure_anti-virus 5.5
f-secure f-secure_anti-virus 5.11
f-secure f-secure_anti-virus 5.11
f-secure f-secure_anti-virus 5.11
f-secure f-secure_anti-virus 5.40
f-secure f-secure_anti-virus 5.40
f-secure f-secure_anti-virus 5.41
f-secure f-secure_anti-virus 5.41
f-secure f-secure_anti-virus 5.41
f-secure f-secure_anti-virus 5.41
f-secure f-secure_anti-virus 5.41
f-secure f-secure_anti-virus 5.42
f-secure f-secure_anti-virus 5.42
f-secure f-secure_anti-virus 5.42
f-secure f-secure_anti-virus 5.42
f-secure f-secure_anti-virus 5.42
f-secure f-secure_anti-virus 5.43
f-secure f-secure_anti-virus 5.43
f-secure f-secure_anti-virus 5.44
f-secure f-secure_anti-virus 5.44
f-secure f-secure_anti-virus 5.51
f-secure f-secure_anti-virus 5.51
f-secure f-secure_anti-virus 5.51
f-secure f-secure_anti-virus 5.52
f-secure f-secure_anti-virus 5.52
f-secure f-secure_anti-virus 5.52
f-secure f-secure_anti-virus 5.52
f-secure f-secure_anti-virus 5.52
f-secure f-secure_anti-virus 5.54
f-secure f-secure_anti-virus 5.54
f-secure f-secure_anti-virus 5.55
f-secure f-secure_anti-virus 5.55
f-secure f-secure_anti-virus 5.56
f-secure f-secure_anti-virus 5.61
f-secure f-secure_anti-virus 5.61
f-secure f-secure_anti-virus 6.01
f-secure f-secure_anti-virus 6.01
f-secure f-secure_anti-virus 6.01
f-secure f-secure_anti-virus 6.02
f-secure f-secure_anti-virus 6.2
f-secure f-secure_anti-virus 6.02
f-secure f-secure_anti-virus 6.2
f-secure f-secure_anti-virus 6.2
f-secure f-secure_anti-virus 6.03
f-secure f-secure_anti-virus 6.03
f-secure f-secure_anti-virus 6.21
f-secure f-secure_anti-virus 6.21
f-secure f-secure_anti-virus 6.30
f-secure f-secure_anti-virus 6.30
f-secure f-secure_anti-virus 6.30_sr1
f-secure f-secure_anti-virus 6.30_sr1
f-secure f-secure_anti-virus 6.31
f-secure f-secure_anti-virus 6.31
f-secure f-secure_anti-virus 6.40
f-secure f-secure_anti-virus 6.40
f-secure f-secure_anti-virus 6.60
f-secure f-secure_anti-virus 6.60
f-secure f-secure_anti-virus 6.61
f-secure f-secure_anti-virus 6.61
f-secure f-secure_anti-virus 7.00
f-secure f-secure_anti-virus 7.00
f-secure f-secure_anti-virus 7.00
f-secure f-secure_anti-virus 7.00
f-secure f-secure_anti-virus 7.00
f-secure f-secure_anti-virus 7.02
f-secure f-secure_anti-virus 2003
f-secure f-secure_anti-virus 2004
f-secure f-secure_anti-virus 2005
f-secure f-secure_anti-virus 2006
f-secure f-secure_anti-virus 2007
f-secure f-secure_anti-virus 2007
f-secure f-secure_anti-virus 2007
f-secure f-secure_anti-virus 2008
f-secure f-secure_anti-virus 2009
f-secure f-secure_anti-virus_client_security *
f-secure f-secure_anti-virus_client_security 6.03
f-secure f-secure_anti-virus_client_security 6.04
f-secure f-secure_anti-virus_client_security 7.01
f-secure f-secure_anti-virus_client_security 7.10
f-secure f-secure_anti-virus_for_citrix_servers 7.00
f-secure f-secure_anti-virus_for_linux *
f-secure f-secure_anti-virus_for_linux 4.65
f-secure f-secure_anti-virus_for_microsoft_exchange 6.62
f-secure f-secure_anti-virus_for_microsoft_exchange 7.00
f-secure f-secure_anti-virus_for_microsoft_exchange 7.10
f-secure f-secure_anti-virus_for_mimesweeper 5.61
f-secure f-secure_anti-virus_for_windows_servers 8.00
f-secure f-secure_anti-virus_for_workstations *
f-secure f-secure_anti-virus_for_workstations 5.44
f-secure f-secure_anti-virus_for_workstations 7.00
f-secure f-secure_anti-virus_for_workstations 7.10
f-secure f-secure_anti-virus_for_workstations 7.11
f-secure f-secure_anti-virus_linux_client_security *
f-secure f-secure_anti-virus_linux_client_security 5.30
f-secure f-secure_anti-virus_linux_client_security 5.52
f-secure f-secure_anti-virus_linux_client_security 5.53
f-secure f-secure_anti-virus_linux_client_security 5.54
f-secure f-secure_anti-virus_linux_server_security *
f-secure f-secure_anti-virus_linux_server_security 5.30
f-secure f-secure_anti-virus_linux_server_security 5.52
f-secure f-secure_anti-virus_linux_server_security 5.54
f-secure f-secure_internet_security *
f-secure f-secure_internet_security *
f-secure f-secure_internet_security 7.02
f-secure f-secure_internet_security 2003
f-secure f-secure_internet_security 2004
f-secure f-secure_internet_security 2005
f-secure f-secure_internet_security 2006
f-secure f-secure_internet_security 2007
f-secure f-secure_internet_security 2007
f-secure f-secure_internet_security 2007
f-secure f-secure_internet_security 2008
f-secure f-secure_internet_security 2009
f-secure home_server_security 2009
f-secure internet_gatekeeper *
f-secure internet_gatekeeper *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "8584A696-5D15-4D14-A2C2-E0821844FB78",
              "versionEndIncluding": "9.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:6.62:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "F073E513-A598-4421-936B-6264122CFB81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:7.0:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "6136A4CA-E833-43AF-8D32-B0DB3D812E56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:7.10:-:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "30602BA3-9043-4E51-9457-16D8D1464EA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E805B40A-9534-4215-9F8B-D533C06666AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "F83DDDED-51E8-43DE-BBA8-4AD36F920BF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53919A2E-99A6-4896-9B23-F8DEA62FB006",
              "versionEndIncluding": "2010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C586FEDB-4335-47FF-81C0-301F5CD80799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2.16:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "1473BDA6-ADD8-41C0-95DD-D82A1317FB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B91DB04A-B6AA-4FDA-B3A1-9E46EC27078D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50:*:linux:*:*:*:*:*",
              "matchCriteriaId": "55C7A7CD-1BAB-475A-BEC1-3AFD15366103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D80681B-B124-4797-BD0C-C137C189C8F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "8C7F4E22-8609-4111-A588-BBA6CFBE3EB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_2:*:*:*:*:*:*:*",
              "matchCriteriaId": "137DBA10-602D-4D34-8AC1-998AD1229820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.50_hotfix_2:*:linux:*:*:*:*:*",
              "matchCriteriaId": "0AB5C071-A13A-4E32-9F40-E41B47D053BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "D606B8B1-C3A7-4110-8610-23FC8E90B30F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*",
              "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*",
              "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51_hotfix_2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A60DEC4D-FD5B-41B3-9BEB-3EF0641C0F05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51_hotfix_2:*:linux:*:*:*:*:*",
              "matchCriteriaId": "DF853D24-E54D-4B0C-B78B-B1EBF29A3481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E705203-E0A9-4F66-8393-926958DF1A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux:*:*:*:*:*",
              "matchCriteriaId": "59824214-B535-400D-9614-797F61F81062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*",
              "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*",
              "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "698A033B-181B-4BD6-9004-BA120D84EE31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*",
              "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA02414-2DD5-4AC2-963E-8B98BAB128B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "5A277838-B3AE-45E4-9E1D-005F63FB7573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.61:*:linux_servers:*:*:*:*:*",
              "matchCriteriaId": "33C62796-C9C0-485E-A58B-6510AFA80F33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFCD75B-B0FA-4811-AC26-2FFC217D17B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.62:*:samba_servers:*:*:*:*:*",
              "matchCriteriaId": "8A2035B9-D6DE-4091-84B0-EC73F491EC43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5F8A5E-5C5B-4C2D-A69E-671D03AEABF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "2F448567-DCAB-4B5F-B939-5B630A5A9B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.64:*:linux_servers:*:*:*:*:*",
              "matchCriteriaId": "A49C5BE3-EF09-4B73-A8F7-95B428EB28F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC9A3CF8-E32C-4C60-91B1-A4C651437F00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_gateways:*:*:*:*:*",
              "matchCriteriaId": "46D73A43-3FBF-422D-B3CF-136F4B7A9A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.65:*:linux_servers:*:*:*:*:*",
              "matchCriteriaId": "58668CA2-425C-470E-BA2A-E791EEED6046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C51DBF04-31F1-42C7-9442-559A0AF52CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_client_security:*:*:*:*:*",
              "matchCriteriaId": "016877EA-FBDE-4E49-8077-CFFCFB8E7DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0:*:linux_server_security:*:*:*:*:*",
              "matchCriteriaId": "8CFC86C0-2E3E-4057-808C-358B4B0463F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8549318-DCD7-420A-AAD6-CE1D7E167E20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E93E69-FE42-4E90-9306-C3A9A6CAAE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:linux_client_security:*:*:*:*:*",
              "matchCriteriaId": "857DC5D0-BAE2-47DE-92A3-63F4960A8022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.01:*:linux_server_security:*:*:*:*:*",
              "matchCriteriaId": "789D6655-F3FF-4F6C-BAF6-452D6ECA207B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BB606BE-CCA7-41BF-AB9F-E7C362FBADA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92D04F2-5029-445C-ADF5-4FCC11E658BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "04041776-EA80-406D-BCAF-EAD1F6FAD53F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:citrix_servers:*:*:*:*:*",
              "matchCriteriaId": "095A03CE-6B8F-4275-87BE-44E807F97939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:mimesweeper:*:*:*:*:*",
              "matchCriteriaId": "A8B5F6AF-561B-45B4-8087-D637FAB9E877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "B7D558FE-0C41-4FC1-AF94-2CDE69FF8CD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E0A121-7894-4E38-9295-3A4BFB8B8749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_client_security:*:*:*:*:*",
              "matchCriteriaId": "17C7BE07-1D72-4E06-BDD4-0281BE35CAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.11:*:linux_server_security:*:*:*:*:*",
              "matchCriteriaId": "FE057604-B92A-4B69-9CD5-189A33C90A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "71DDEE06-C625-44F5-8D39-156088563F64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.40:*:workstations:*:*:*:*:*",
              "matchCriteriaId": "461627F0-2CEF-4623-B38E-6B30059B0B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "216282DF-8055-4691-93C7-8152B2F761BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:file_servers:*:*:*:*:*",
              "matchCriteriaId": "9528ACFA-2A1C-4292-BDB6-93041E9CE97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*",
              "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*",
              "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "510A1602-D3D1-4CCE-9FB8-29D8F4E05924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:file_servers:*:*:*:*:*",
              "matchCriteriaId": "035181DB-9366-42A7-B783-3E8415FA8FBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*",
              "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*",
              "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D9B8B6-1B7E-4FB1-85CD-695C39927463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.43:*:workstations:*:*:*:*:*",
              "matchCriteriaId": "352EE11B-2385-4359-BEA1-706FEA3E9D9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5C145F-C336-4FD0-8262-2CBDE3FBA12B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.44:*:workstations:*:*:*:*:*",
              "matchCriteriaId": "D35E1591-553E-42F0-AE3E-16A2A5640F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBDF39BC-ED88-4E49-97A5-4E2B7BB001F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:citrix_servers:*:*:*:*:*",
              "matchCriteriaId": "2CFD7DE5-37B0-4AA9-8026-D13EFA31DDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.51:*:mimesweeper:*:*:*:*:*",
              "matchCriteriaId": "99727375-701D-4AD9-9410-B69B7603807C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "112A4C41-3201-4BDA-BC08-355A4B9C2347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:citrix_servers:*:*:*:*:*",
              "matchCriteriaId": "CAB9474C-A4F9-45C0-A77C-34B794AE2262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:mimesweeper:*:*:*:*:*",
              "matchCriteriaId": "0D47BE5A-D3C9-4B97-AFB1-633AE69F911E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "AD772D28-E146-470A-AAD6-838587420FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F12483-2AAA-4269-BE97-65E80CE09C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.54:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "6D9796D5-C957-410D-96A8-7C1AC1D614A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44D5E36-58AC-417E-91F0-C7F9D4B8D34B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.55:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "94B734B9-4D8C-4195-AA01-83DDEC535BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EDFA260-07D3-463D-BDAA-4C6F9F4D52FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBB5C76-E785-4A1D-A855-21F346ABA3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.61:*:mimesweeper:*:*:*:*:*",
              "matchCriteriaId": "AEF8C12D-ADF4-4FAE-8B13-B69BFA5AFF2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D92D81-A2F8-47F0-8A79-2318A19D9CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "F874EF46-3E17-4A51-A576-7E0BFE1FD4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.01:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "1171FFA9-4898-4174-AD17-C6E47A120585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5145EA79-BB99-4DF6-82CD-539AFBE393CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F1F7D7-2F21-46EC-8991-F565556AFDAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.02:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "995DCFD5-5745-48E6-BC0E-B8AE3F194CFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:firewalls:*:*:*:*:*",
              "matchCriteriaId": "A937E670-6263-4497-B17F-1D19D48ED6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.2:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "4401535F-9AC5-4419-A6B6-9A877887A3D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "366ED344-85B2-418D-90E6-19B27260B465",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.03:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "2B5FC2F8-A355-4964-B908-0DCC00734BB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35B56AC-3C96-43C4-88D0-FAB97C3C28BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A8AA65-9B9E-419C-9D1C-D5A88778D8BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "97610DB9-0379-4EB3-95E6-9B5C21E5A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC32B19D-E275-4D63-A9CA-403D7B87DD9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.30_sr1:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "5777A2C3-5EB0-495E-8E0E-94BCA86D5E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBCFE4AA-9E83-442B-89F9-413BBA5A31F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.31:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "2D43D811-F305-4709-9C43-862A7FC783B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F78CC67-B3AA-4503-9F49-7E605C230816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.40:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "375B5B66-822B-4142-BAA3-0928DE7A8D6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "410D9937-4480-482C-A672-8F578EF1F0D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.60:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "3F1CCFFE-4745-46BE-840F-F658245A6058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBB2803F-8685-4803-9C93-E9D4A672D333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.61:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "880E04C0-42C2-4261-92D1-CF83133567F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "163EACA6-64CC-4554-BE19-52AB02D1F67D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:client_security:*:*:*:*:*",
              "matchCriteriaId": "D990AE62-7B09-4DA8-ADB7-3CBA2DF18683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:ms_exchange:*:*:*:*:*",
              "matchCriteriaId": "C2BF5C8E-D1C4-4082-AFBE-8A8413CE1392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:windows_servers:*:*:*:*:*",
              "matchCriteriaId": "BED6F056-D9E2-4799-A432-DC07F8154AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.00:*:workstations:*:*:*:*:*",
              "matchCriteriaId": "4382A281-75F3-455C-B7EF-8514531C17C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:7.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B028C22E-399E-4A90-9673-64E4D510273E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*",
              "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2C1784-2482-4CBE-BE6D-4519C3FB64BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6B8424-EED8-4A09-9A9C-FC5F76A9FAF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "1106DE08-DE9A-488B-8C5D-28E353CDEEEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:*:second:*:*:*:*:*",
              "matchCriteriaId": "62204373-31FA-4F28-AA22-D4D6F3B80F9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2007:second_edition:*:*:*:*:*:*",
              "matchCriteriaId": "C8609465-1436-4F50-B7EE-0DF9DA7AA4CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47EC4EB-268A-4BB9-820D-AA3DB8D1A655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2009:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B68C319-313F-4CA5-9B37-D9860071E763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA805B86-7E74-4E27-A06D-41F86FDFAAA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:6.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "85517B0C-8C1A-4306-8466-2C138AD0709A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:6.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0657810-2CB9-4887-8AA2-3E0927937820",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:7.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FA86FF-A114-44EB-884A-766BEE17FD5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_client_security:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD2B3CE-78CC-4BE7-80EB-25675371B5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_citrix_servers:7.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3776E315-E935-4422-A3F3-F6D261DFDB86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3346E2B-C289-41A2-80B6-D8DA7697CC32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_linux:4.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "04102648-2C1C-420E-BBF7-5C948F0EE479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:6.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "D622E750-A9AB-4EF3-BC2F-D7C3FFE8C961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:7.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EEA770-211A-4568-BB9F-9FE76D7BFCB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_microsoft_exchange:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C05AE3-5003-44B0-BAFB-F5081373994F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_mimesweeper:5.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "C03EB725-E91E-4CA3-A903-0CD45D7EE2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_windows_servers:8.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC68767-4F85-4D80-AB6C-38A3362144A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7B8FE8-8458-4C38-8FE6-6A7BEA28EB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "9848B969-A0A4-4F38-9C6C-79395EFF8254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AB820-8069-430A-89AC-3E0122EB3B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D9F9488-8DA8-48A9-9A11-B5E0D7AA9A7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_for_workstations:7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C775FD8-A757-41A6-BBC3-29BC9D2D12A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1BF1F7-8570-46A8-BDFE-43720C44576E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "9523BF6D-AF64-4CFE-B017-695B6BB175C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77AB622-B899-46FD-9DFA-1964B57A9458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8DB2DD7-86DC-440A-B8D9-0A84034E808F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_client_security:5.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E53728-0B65-48C4-A812-8915BFC5A51A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F433148-3A0B-4F84-B4FB-A8EFFCB22EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "66AB396E-475C-404F-BEE1-66DE9C3A7555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E6FC4F-F768-43FF-9627-DF41CD7D799C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus_linux_server_security:5.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "105743CC-1365-404D-9B3D-0CDBFDF4BB33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8900048F-8EAB-4BF7-98C1-57F8DA49AF06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53E8102-9A65-45FD-AFDE-25861BC49B7B",
              "versionEndIncluding": "2010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:7.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DC5D86-0C4A-4F94-83A2-DB21B868ACCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*",
              "matchCriteriaId": "6689D4E1-F8DC-46D9-BA35-4E4AE9C28456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "89A0FDD3-3364-4452-BD6F-EB6F85D3119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "C788A5AB-C847-476C-9767-C6711F2D4EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "3972C7F1-8B78-4A5D-8A75-C6CA01E997DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:*:second:*:*:*:*:*",
              "matchCriteriaId": "94858828-3626-4654-AB6A-597A49C79284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2007:second_edition:*:*:*:*:*:*",
              "matchCriteriaId": "C0DCADF7-B044-4646-B215-52685609ED49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "08ED9945-DC9F-4F4F-B2EB-B63986BCC7D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2009:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77467E5-A143-4720-93EE-29B399417065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:home_server_security:2009:*:*:*:*:*:*:*",
              "matchCriteriaId": "5399311C-0418-45CA-9FED-082D9B484D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux:*:*:*:*:*",
              "matchCriteriaId": "1312B800-FE46-4D50-82E8-76201A8C3228",
              "versionEndIncluding": "4.02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:windows:*:*:*:*:*",
              "matchCriteriaId": "06B35ABF-C401-4DF4-9935-55E797E60220",
              "versionEndIncluding": "6.61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "F-Secure Internet Security 2010 and earlier; Anti-Virus for Microsoft Exchange 9 and earlier, and for MIMEsweeper 5.61 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, and for Linux 4.02 and earlier; Anti-Virus 2010 and earlier; Home Server Security 2009; Protection Service for Consumers 9 and earlier, for Business - Workstation security 9 and earlier, for Business - Server Security 8 and earlier, and for E-mail and Server security 9 and earlier; Mac Protection build 8060 and earlier; Client Security 9 and earlier; and various Anti-Virus products for Windows, Linux, and Citrix; does not properly detect malware in crafted (1) 7Z, (2) GZIP, (3) CAB, or (4) RAR archives, which makes it easier for remote attackers to avoid detection."
    },
    {
      "lang": "es",
      "value": "F-Secure Internet Security 2010 y anteriores; Anti-Virus para Microsoft Exchange 9 y anteriores, y para MIMEsweeper v5.61 y anteriores; Internet Gatekeeper para Windows v6.61 y anteriores, y para Linux v4.02 y anteriores; Anti-Virus 2010 y anteriores; Home Server Security 2009; Protection Service para Consumers 9 y anteriores, para Business - Workstation security 9 y anteriores, para Business - Server Security 8 y anteriores, y para E-mail y Server security 9 y anteriores; Mac Protection build 8060 y anteriores; Client Security 9 y anteriores; y varios productos Anti-Virus para Windows, Linux, y Citrix no detectan adecuadamente malware en archivos (1) 7Z, (2) GZIP, (3) CAB, o (4) RAR manipulados, lo que facilita a atacantes evitar la detecci\u00f3n."
    }
  ],
  "id": "CVE-2010-1425",
  "lastModified": "2024-11-21T01:14:23.337",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-15T21:30:00.383",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39396"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023841"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023842"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1023843"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0855"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-04-18 14:55
Modified
2024-11-21 01:46
Severity ?
Summary
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:-:-:-:*:*:macos:*:*",
              "matchCriteriaId": "0DF36614-76CF-4E7F-B3F8-69B20A5FC3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:psb_workstation_security:-:-:-:*:*:macos:*:*",
              "matchCriteriaId": "58EE0329-58CB-4E34-9F08-00E3F0BDC868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:safe_anywhere:-:-:-:*:*:macos:*:*",
              "matchCriteriaId": "F73E7E17-C423-4A4F-8944-571B537E8579",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "F-Secure Anti-Virus, Safe Anywhere y PSB Workstation Security anterior a 11500 para Mac OS X permite a usuarios locales deshabilitar el firewall de Mac OS X a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2012-6646",
  "lastModified": "2024-11-21T01:46:36.377",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-04-18T14:55:25.540",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en/web/labs_global/fsc-2012-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.f-secure.com/en/web/labs_global/fsc-2012-2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2024-11-21 01:36
Severity ?
Summary
The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Impacted products
Vendor Product Version
aladdin esafe 7.0.17.0
bitdefender bitdefender 7.2
comodo comodo_antivirus 7424
f-secure anti-virus 9.0.16160.0
mcafee gateway 2010.1c
mcafee scan_engine 5.400.0.1158
nprotect nprotect_antivirus 2011-01-17.01
rising-global rising_antivirus 22.83.00.03
sophos sophos_anti-virus 4.61.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*",
              "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:anti-virus:9.0.16160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D00BACD-15D1-49B9-B4CA-514AE7EC5500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D386C31F-6114-4A15-B0D5-15686D7EF8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0912E21E-1EEB-4ADD-958F-F8AEBBF7C5E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\19\\04\\00\\10 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos ELF en BitDefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (anteriormente Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, y Rising Antivirus 22.83.00.03 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo ELF con una secuencia de caracteres \\19\\04\\00\\10 en un lugar determinado. NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador ELF."
    }
  ],
  "id": "CVE-2012-1430",
  "lastModified": "2024-11-21T01:36:58.023",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:47.583",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}