Vulnerabilites related to sophos - anti-virus
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 4.7.18 | |
sophos | anti-virus | 4.7.18 | |
sophos | anti-virus | 4.9.18 | |
sophos | anti-virus | 4.37.0 | |
sophos | anti-virus | 6.4.5 | |
sophos | anti-virus | 7.0.5 | |
sophos | anti-virus7.6.3 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*", "matchCriteriaId": "F1BEF5DD-8418-4C76-9351-ACD3ED25236E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*", "matchCriteriaId": "A15CB3E6-A97F-491B-B27E-E4AF255E0088", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*", "matchCriteriaId": "E61D3204-DE1E-489E-9624-DD02F1B58F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*", "matchCriteriaId": "77FF9B2E-2A38-4A13-AA20-83081A5D9AF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*", "matchCriteriaId": "550B1595-4C9F-412C-B903-DDD8202C1F4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*", "matchCriteriaId": "52F3B857-84EC-4FB8-A332-B7B81BCEB28C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*", "matchCriteriaId": "98EFEFC0-92AC-43A6-A072-B6AD2D4B0984", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a \"fuzzed\" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats." }, { "lang": "es", "value": "Sophos Anti-Virus para Windows anteriores a v7.6.3, Anti-Virus para Windows NT/9x anteriores a v.4.7.18, Anti-Virus para OS X anteriores a v.4.9.18, Anti-Virus para Linux anteriores a v.6.4.5, Anti-Virus para UNIX anteriores a v7.0.5, Anti-Virus para Unix y Netware anteriores a v.4.37.0, Sophos EM Library, y Sophos small business solutions, cuando el archivo escaneado CAB est\u00e1 activo, permite a atacantes remotos causar una denegaci\u00f3n de servicio (falta de segmentaci\u00f3n) a trav\u00e9s del fichero \"fuzzed\" CAB, como se ha demostrado mediante la suite para el testeo de formatos de archivo PROTOS GENOME." } ], "id": "CVE-2008-6903", "lastModified": "2024-11-21T00:57:45.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-06T00:30:00.297", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/50863" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33177" }, { "source": "cve@mitre.org", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32748" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1021476" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1021476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3458" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "EE16A914-C7EC-4164-A693-59EA5958BC7F", "versionEndIncluding": "9.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter to exclusion/configure or (4) text:EmailServer or (5) newListList:Email parameter to notification/configure." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en la interfaz de usuario web en Sophos Anti-Virus para Linux anterior a 9.6.1 permiten a usuarios locales inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems o (3) newListList:ExcludeMountPaths en exclusion/configure o el par\u00e1metro (4) text:EmailServer o (5) newListList:Email en notification/configure." } ], "id": "CVE-2014-2385", "lastModified": "2024-11-21T02:06:11.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-07-22T14:55:08.833", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/126" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/532558/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1030467" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sophos.com/en-us/support/knowledgebase/121135.aspx" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/532558/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sophos.com/en-us/support/knowledgebase/121135.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 4.33.0 | |
microsoft | internet_explorer | 6 | |
microsoft | internet_explorer | 7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:4.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "41F2865A-0D90-4E78-B2C7-9F6CF13A986E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507", "vulnerable": false }, { "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus 4.33.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka \"EXE info\") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit." }, { "lang": "es", "value": "Sophos Anti-Virus v4.33.0, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detecci\u00f3n de malware en un documento HTML colocando una cabecera MZ (alias \"EXE info\") al principio, y modificar el nombre del archivo a (1 ) sin extensi\u00f3n, (2) una extensi\u00f3n. txt, o (3) una extensi\u00f3n .jpg, como lo demuestra un documento que contiene un exploit CVE-2006-5745." } ], "id": "CVE-2008-5541", "lastModified": "2024-11-21T00:54:17.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-12-12T18:30:03.077", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4723" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.0.4 | |
sophos | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B0A565-0E33-419F-B209-7F87CB7AC702", "versionEndIncluding": "6.04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\"" }, { "lang": "es", "value": "Sophos Anti-Virus y Endpoint Security versiones anteriores a 6.0.5, Anti-Virus para Linux anteriores a 5.0.10, y otras plataformas anteriores a 4.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n o agotamiento de memoria) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero CHM mal formado con manipulaciones concretas del segmento de cabecera CHM, tambi\u00e9n conocido como \"vulnerabilidad de agotamiento de memoria en longitud de nombre CHM\".\r\n" } ], "id": "CVE-2006-5647", "lastModified": "2024-11-21T00:20:03.010", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-01T15:07:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22591" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017132" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20816" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4239" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | * | |
sophos | anti-virus | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8AC8FFF-FAAA-499B-85E9-0A17C6A81C53", "versionEndIncluding": "6.5.4_r2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D064580-D2D5-410D-BD1C-31173C4A9898", "versionEndIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Sophos Anti-Virus for Windows 6.x before 6.5.8 and 7.x before 7.0.1 allows remote attackers to inject arbitrary web script or HTML via an archive with a file that matches a virus signature and has a crafted filename that is not properly handled by the print function in SavMain.exe." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en Sophos Anti-Virus para Windows versiones 6.x anteriores a 6.5.8 y versiones 7.x anteriores a 7.0.1, permite a atacantes remotos inyectar script web o HTML arbitrario por medio de un registro con un archivo que coincide con una firma de virus y tiene un nombre de archivo dise\u00f1ado que no es manejado apropiadamente mediante la funci\u00f3n print en el archivo SavMain.exe." } ], "id": "CVE-2007-4512", "lastModified": "2024-11-21T00:35:46.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-09-10T17:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/37527" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26714" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3107" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/478708/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25572" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/29150.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3077" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/478708/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/29150.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36478" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 3.4.6 | |
sophos | anti-virus | 3.78 | |
sophos | anti-virus | 3.78d | |
sophos | anti-virus | 3.79 | |
sophos | anti-virus | 3.80 | |
sophos | anti-virus | 3.81 | |
sophos | anti-virus | 3.82 | |
sophos | anti-virus | 3.83 | |
sophos | anti-virus | 3.84 | |
sophos | anti-virus | 3.85 | |
sophos | anti-virus | 3.86 | |
sophos | anti-virus | 3.90 | |
sophos | anti-virus | 3.91 | |
sophos | anti-virus | 3.95 | |
sophos | anti-virus | 3.96.0 | |
sophos | anti-virus | 4.03 | |
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.5 | |
sophos | scanning_engine | 2.30.4 | |
sophos | scanning_engine | 2.40.2 | |
sophos | small_business_suite | 4.04 | |
sophos | small_business_suite | 4.05 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "76354221-841C-443C-921A-6242BF875918", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*", "matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*", "matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." }, { "lang": "es", "value": "Sophos Anti-Virus para Windows y para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un archivo empaquetado con UPX manipulado, resultado de una \"conversi\u00f3n de vuelta de entero\" (integer cast around). NOTA: a fecha de 28/08/2007, el fabricante dice que esto es una denegaci\u00f3n de servicio y el investigador dice que permite ejecuci\u00f3n de c\u00f3digo, pero el investigador es fiable." } ], "id": "CVE-2007-4578", "lastModified": "2024-11-21T00:35:56.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-28T18:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3072" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018608" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25428" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2972" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.0.4 | |
sophos | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B0A565-0E33-419F-B209-7F87CB7AC702", "versionEndIncluding": "6.04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero." }, { "lang": "es", "value": "Sophos Anti-Virus y Endpoint Security anteriores a 6.0.5, Anti-virus para Linux 5.0.10, y otras plataformas en versiones anteriores a la 4.11, permite a atacantes remotos causar denegaci\u00f3n de servicio (bucle infinito) mediante un fichero RAR mal formado con una secci\u00f3n de Cabecera de Archivo con los campos head_size y pack_size puestos a cero." } ], "id": "CVE-2006-5645", "lastModified": "2024-11-21T00:20:02.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-01T15:07:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22591" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017132" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20816" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018450" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4239" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.0.4 | |
sophos | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "39B0A565-0E33-419F-B209-7F87CB7AC702", "versionEndIncluding": "6.04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00f3n en Sophos Anti-Virus y Endpoint Security versiones anteriores a 6.0.5, Anti-Virus para Linux anteriores a 5.0.10, y otras plataformas anteriores a 4.11, cuando el escaneo de archivos est\u00e1 habilitado, permite a atacantes remotos disparar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo CHM con una cabecera de descompresi\u00f3n LZX que especifica un tama\u00f1o de ventana 0." } ], "id": "CVE-2006-5646", "lastModified": "2024-11-21T00:20:02.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-01T15:07:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22591" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017132" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20816" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/4239" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "20367487-5266-4F79-85CF-DF024D23D115", "versionEndIncluding": "7.6.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "76354221-841C-443C-921A-6242BF875918", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:*:*:*:*:*:*", "matchCriteriaId": "20E8CC2D-5BC8-4EDA-BC52-922B8D280E98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "41F2865A-0D90-4E78-B2C7-9F6CF13A986E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08FACDD3-92A8-4325-AD0D-81100BA81F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1678D2A7-32D6-4A9E-884C-5850A4BC273D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3605FC9-61B9-489D-863C-5248D71BCF62", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "F977E43C-B6C7-4C87-A619-1B0B95D40E06", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "4D959321-4D57-44FE-A15E-7C5D443EA588", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "275D6900-9868-478A-B159-B04883AD3992", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "7B7B3DF7-D255-4B43-BFA7-BA18C7CD2213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "8F6D123E-EE26-40DF-B958-E86E0957A8DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "5233DBFD-0BEC-4315-9F42-7F6F7B6F8C18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the filter driver (savonaccessfilter.sys) in Sophos Anti-Virus before 7.6.20 allows local users to gain privileges via crafted arguments to the NtQueryAttributesFile function." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el controlador de filtrado (savonaccessfilter.sys) en Sophos Anti-Virus anterior a v7.6.20, permite a usuarios locales elevar sus privilegios a trav\u00e9s de argumentos manipulados en la funci\u00f3n NtQueryAttributesFile." } ], "id": "CVE-2010-2308", "lastModified": "2024-11-21T01:16:22.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-06-16T20:30:02.747", "references": [ { "source": "cve@mitre.org", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40085" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/511773/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024089" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sophos.com/support/knowledgebase/article/111126.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/40085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/511773/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sophos.com/support/knowledgebase/article/111126.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1412" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 3.4.6 | |
sophos | anti-virus | 3.78 | |
sophos | anti-virus | 3.78d | |
sophos | anti-virus | 3.79 | |
sophos | anti-virus | 3.80 | |
sophos | anti-virus | 3.81 | |
sophos | anti-virus | 3.82 | |
sophos | anti-virus | 3.83 | |
sophos | anti-virus | 3.84 | |
sophos | anti-virus | 3.85 | |
sophos | anti-virus | 3.86 | |
sophos | anti-virus | 3.90 | |
sophos | anti-virus | 3.91 | |
sophos | anti-virus | 3.95 | |
sophos | anti-virus | 3.96.0 | |
sophos | anti-virus | 4.03 | |
sophos | anti-virus | 4.04 | |
sophos | anti-virus | 4.05 | |
sophos | anti-virus | 4.5.3 | |
sophos | anti-virus | 4.5.4 | |
sophos | anti-virus | 4.5.11 | |
sophos | anti-virus | 4.5.12 | |
sophos | anti-virus | 4.7.1 | |
sophos | anti-virus | 4.7.2 | |
sophos | anti-virus | 5.0.1 | |
sophos | anti-virus | 5.0.2 | |
sophos | anti-virus | 5.0.4 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.0.9 | |
sophos | anti-virus | 5.1 | |
sophos | anti-virus | 5.2 | |
sophos | anti-virus | 5.2.1 | |
sophos | anti-virus | 6.5 | |
sophos | scanning_engine | 2.30.4 | |
sophos | scanning_engine | 2.40.2 | |
sophos | small_business_suite | 4.04 | |
sophos | small_business_suite | 4.05 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E45839C3-4753-4D22-8FA7-9B0DF6C93414", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*", "matchCriteriaId": "8DF9F90F-3E38-496F-A84A-45FC60B7613E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*", "matchCriteriaId": "A27F909C-E84F-466F-BB40-D43A0570B9C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*", "matchCriteriaId": "76354221-841C-443C-921A-6242BF875918", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*", "matchCriteriaId": "245520DD-FDA3-4470-94C9-4A351D028BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*", "matchCriteriaId": "147AF135-4638-4015-B1C1-411611C3FC86", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*", "matchCriteriaId": "9BAAFDEA-B08E-4BA9-9333-DFDC35B00D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*", "matchCriteriaId": "C4E27696-23CE-4ADD-9859-B0CB1DF02E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*", "matchCriteriaId": "44F9357C-2CFC-4866-8D22-E5BE48182D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*", "matchCriteriaId": "19A98770-8AF2-4B2D-9783-8E2B01D631E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*", "matchCriteriaId": "30136876-3778-4C3A-9CE3-0440588594A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*", "matchCriteriaId": "39972E3A-B377-44DC-B16B-AA6E7ECCE29D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*", "matchCriteriaId": "58B3AE9A-2337-4225-8C1B-87933EE99E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "C5922BAB-7DF5-4F65-AC6E-038900B79396", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*", "matchCriteriaId": "5816EC94-1005-4467-825A-6BB43525FE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.03:*:linux:*:*:*:*:*", "matchCriteriaId": "DD24F0C5-CB2B-4C67-BD0E-34A1C6358618", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "7D9D6E1E-9FA4-4BA1-8648-2E1A6A8FC4CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "799249AD-3E8A-4584-A680-A3E618B5372D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "587205B1-322E-478D-9B46-8F20F371C87C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "B9B6B5D4-E335-4377-8D98-87656522D056", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "0ED1228F-0733-42D9-853A-B1EB4EB20A91", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "136B6228-D71B-4985-B555-5ABC38EF2B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4518D58D-BD49-4E02-AB93-B1B45B774F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "A398BC60-0F67-4A32-A6CD-F3410D81834F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D2CFB6-F135-40B5-ACF8-D6513C0AB682", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B781BEA-E3D6-4260-913F-99D46DCC97D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4D7952D2-2FE4-44E3-B964-976964CFFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "05361082-2A61-40D9-9EEE-6ED3C032FB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.0.9:*:linux:*:*:*:*:*", "matchCriteriaId": "98A094D5-C2AD-4DFE-A088-0011268BB65C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0AF1DE9-A0A1-4193-9AD9-56BF39F3557A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CC4E8-C039-4895-A3EF-BF1927266744", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "67E8DF83-4F1B-4E4C-A613-EF0C4502FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "41FAD883-919D-4719-A964-C93F40EE658D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.30.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A092119-BF22-4FDC-8922-4993AEAA1327", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:scanning_engine:2.40.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7AE52-0978-4EBB-8177-CCF792B98DAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "9B8657D5-7DB2-428D-9125-B3BC4D5F2263", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:small_business_suite:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "190B0808-8ABD-499C-8A84-7B630BB1E2E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")." }, { "lang": "es", "value": "Sophos Anti-Virus para Unix/Linux anterior a 2.48.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo BZip mal formado que resulta en la creaci\u00f3n de m\u00faltiples ficheros Engine temporales (tambi\u00e9n conocida como \"bomba BZip\")." } ], "id": "CVE-2007-4577", "lastModified": "2024-11-21T00:35:56.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-28T18:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3073" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018608" }, { "source": "cve@mitre.org", "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25428" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2972" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 7.0.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E3605FC9-61B9-489D-863C-5248D71BCF62", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus 7.0.5, and other 7.x versions, when Runtime Behavioural Analysis is enabled, allows local users to cause a denial of service (reboot with the product disabled) and possibly gain privileges via a zero value in a certain length field in the ObjectAttributes argument to the NtCreateKey hooked System Service Descriptor Table (SSDT) function." }, { "lang": "es", "value": "Sophos Anti-Virus 7.0.5 y otras versiones 7.x, cuando est\u00e1 habilitado Runtime Behavioural Analysis, permite a usuarios locales provocar una denegaci\u00f3n de servicio (reinicio con el producto deshabilitado) y posiblemente obtener privilegios mediante un valor zero en cierto campo length en el argumento ObjectAttributes a la funci\u00f3n NtCreateKey hooked System Service Descriptor Table (SSDT)." } ], "id": "CVE-2008-1737", "lastModified": "2024-11-21T00:45:12.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-30T00:10:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29996" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3838" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019945" }, { "source": "cve@mitre.org", "url": "http://www.coresecurity.com/?action=item\u0026id=2249" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/491405/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28743" }, { "source": "cve@mitre.org", "url": "http://www.sophos.com/support/knowledgebase/article/37810.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1381" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019945" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.coresecurity.com/?action=item\u0026id=2249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/491405/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sophos.com/support/knowledgebase/article/37810.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sophos | anti-virus | 4.7.18 | |
sophos | anti-virus | 4.7.18 | |
sophos | anti-virus | 4.9.18 | |
sophos | anti-virus | 4.37.0 | |
sophos | anti-virus | 6.4.5 | |
sophos | anti-virus | 7.0.5 | |
sophos | anti-virus7.6.3 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows-nt:*:*:*:*:*", "matchCriteriaId": "F1BEF5DD-8418-4C76-9351-ACD3ED25236E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.7.18:*:windows_9x:*:*:*:*:*", "matchCriteriaId": "A15CB3E6-A97F-491B-B27E-E4AF255E0088", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.9.18:*:os_x:*:*:*:*:*", "matchCriteriaId": "E61D3204-DE1E-489E-9624-DD02F1B58F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:4.37.0:*:netware:*:*:*:*:*", "matchCriteriaId": "77FF9B2E-2A38-4A13-AA20-83081A5D9AF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:6.4.5:*:linux:*:*:*:*:*", "matchCriteriaId": "550B1595-4C9F-412C-B903-DDD8202C1F4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus:7.0.5:*:unix:*:*:*:*:*", "matchCriteriaId": "52F3B857-84EC-4FB8-A332-B7B81BCEB28C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sophos:anti-virus7.6.3:*:windows:*:*:*:*:*:*", "matchCriteriaId": "98EFEFC0-92AC-43A6-A072-B6AD2D4B0984", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Sophos SAVScan v4.33.0 de Linux, y probablemente otros productos y versiones, permiten a atacantes remotos causar una denegaci\u00f3n de servicio (falta de segmentaci\u00f3n) y probablemente ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de archivos manipulados que han sido empaquetados con (1)armadillo, (2) asprotect, o (3) asprotectSKE." } ], "id": "CVE-2008-6904", "lastModified": "2024-11-21T00:57:46.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-06T01:30:00.217", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32748" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200501-0309
Vulnerability from variot
Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. A remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0309", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "anti-virus", "scope": "eq", "trust": 1.6, "vendor": "sophos", "version": "3.78d" }, { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0933" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 }, "cve": "CVE-2004-0933", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9363", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0933", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200501-311", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9363", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 through 2.4, and EZ-Antivirus 6.1 through 6.3 allow remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. \nA remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue", "sources": [ { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9363" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9363", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0933", "trust": 2.0 }, { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-311", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9363", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "id": "VAR-200501-0309", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9363" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:29.156000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Multiple antivirus software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146860" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0933" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9363" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0933" }, { "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9363" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0933" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9363" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0933" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-311" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": " Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-311" } ], "trust": 0.6 } }
var-201203-0144
Vulnerability from variot
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR Parser If it is announced that there is also a problem with the implementation of CVE May be split.Corresponding to the length field of the full entry and part of the header of the next entry by a third party TAR Malware detection may be bypassed through archive entries. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bit2defender 7. ============================================================================ Ubuntu Security Notice USN-1482-2 June 20, 2012
clamav regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
Summary:
ClamAV could improperly detect malware if it opened a specially crafted file.
Software Description: - clamav: Anti-virus utility for Unix
Details:
USN-1482-1 fixed vulnerabilities in ClamAV. The updated packages could fail to install in certain situations. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that ClamAV incorrectly handled certain malformed TAR archives. (CVE-2012-1457, CVE-2012-1459)
It was discovered that ClamAV incorrectly handled certain malformed CHM files. A remote attacker could create a specially-crafted CHM file containing malware that could escape being detected. (CVE-2012-1458)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: clamav 0.97.5+dfsg-1ubuntu0.12.04.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.2 libclamav6 0.97.5+dfsg-1ubuntu0.12.04.2
Ubuntu 11.10: clamav 0.97.5+dfsg-1ubuntu0.11.10.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.2 libclamav6 0.97.5+dfsg-1ubuntu0.11.10.2
Ubuntu 11.04: clamav 0.97.5+dfsg-1ubuntu0.11.04.2 clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.2 libclamav6 0.97.5+dfsg-1ubuntu0.11.04.2
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1482-2 http://www.ubuntu.com/usn/usn-1482-1 https://launchpad.net/bugs/1015337
Package Information: https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2 https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2012:094 http://www.mandriva.com/security/
Package : clamav Date : June 18, 2012 Affected: Enterprise Server 5.0
Problem Description:
This is a bugfix release that upgrades clamav to the latest version (0.97.5) that resolves the following security issues:
The TAR file parser in ClamAV 0.96.4 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459 http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5
Updated Packages:
Mandriva Enterprise Server 5: d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf OUr1QL5Wsvt3KboLKCdYUhE= =1QL7 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "virusbuster", "scope": "eq", "trust": 2.4, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "security essentials", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2.0" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "security essentials", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2.0 antimalware engine 1.1.6402.0" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "anti-virus clamav", "scope": "eq", "trust": 0.3, "vendor": "clam", "version": "0.96.4" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1459" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52623" } ], "trust": 0.3 }, "cve": "CVE-2012-1459", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1459", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54740", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1459", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-422", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR Parser If it is announced that there is also a problem with the implementation of CVE May be split.Corresponding to the length field of the full entry and part of the header of the next entry by a third party TAR Malware detection may be bypassed through archive entries. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bit2defender 7. ============================================================================\nUbuntu Security Notice USN-1482-2\nJune 20, 2012\n\nclamav regression\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n- Ubuntu 11.10\n- Ubuntu 11.04\n\nSummary:\n\nClamAV could improperly detect malware if it opened a specially crafted file. \n\nSoftware Description:\n- clamav: Anti-virus utility for Unix\n\nDetails:\n\nUSN-1482-1 fixed vulnerabilities in ClamAV. The updated packages could fail\nto install in certain situations. This update fixes the problem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n It was discovered that ClamAV incorrectly handled certain malformed TAR\n archives. (CVE-2012-1457,\n CVE-2012-1459)\n \n It was discovered that ClamAV incorrectly handled certain malformed CHM\n files. A remote attacker could create a specially-crafted CHM file\n containing malware that could escape being detected. (CVE-2012-1458)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n clamav 0.97.5+dfsg-1ubuntu0.12.04.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.12.04.2\n libclamav6 0.97.5+dfsg-1ubuntu0.12.04.2\n\nUbuntu 11.10:\n clamav 0.97.5+dfsg-1ubuntu0.11.10.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.10.2\n libclamav6 0.97.5+dfsg-1ubuntu0.11.10.2\n\nUbuntu 11.04:\n clamav 0.97.5+dfsg-1ubuntu0.11.04.2\n clamav-daemon 0.97.5+dfsg-1ubuntu0.11.04.2\n libclamav6 0.97.5+dfsg-1ubuntu0.11.04.2\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-1482-2\n http://www.ubuntu.com/usn/usn-1482-1\n https://launchpad.net/bugs/1015337\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2\n https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2012:094\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : clamav\n Date : June 18, 2012\n Affected: Enterprise Server 5.0\n _______________________________________________________________________\n\n Problem Description:\n\n This is a bugfix release that upgrades clamav to the latest version\n (0.97.5) that resolves the following security issues:\n \n The TAR file parser in ClamAV 0.96.4 allows remote attackers to bypass\n malware detection via a TAR archive entry with a length field that\n exceeds the total TAR file size. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459\n http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.97.5\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Enterprise Server 5:\n d82d78601290e2f6073974170c81841a mes5/i586/clamav-0.97.5-0.1mdvmes5.2.i586.rpm\n 80f0475472c0217afd3727019bf27e53 mes5/i586/clamav-db-0.97.5-0.1mdvmes5.2.i586.rpm\n c13835eadea8d2af15b628fba3159e8b mes5/i586/clamav-milter-0.97.5-0.1mdvmes5.2.i586.rpm\n d7c058fae32f1a081b1d4ca31157df0e mes5/i586/clamd-0.97.5-0.1mdvmes5.2.i586.rpm\n 5ad153709c7eb510c2be2e82bfa5ac52 mes5/i586/libclamav6-0.97.5-0.1mdvmes5.2.i586.rpm\n 96e3d3f3e9bea802c4109c155c9d1465 mes5/i586/libclamav-devel-0.97.5-0.1mdvmes5.2.i586.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n b30f5aafd9aaff0a7743fb62f33ccbea mes5/x86_64/clamav-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 1508801239427c0ac72734f52cb4451c mes5/x86_64/clamav-db-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 92b4c5ca6db656801b5b6ae217c6e171 mes5/x86_64/clamav-milter-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 94fad12df2cc900309087bbda13c826a mes5/x86_64/clamd-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 8ec166a457d0512479adaaf5f80d487f mes5/x86_64/lib64clamav6-0.97.5-0.1mdvmes5.2.x86_64.rpm\n 19bc2758175bcde28ebf7783d68a9b98 mes5/x86_64/lib64clamav-devel-0.97.5-0.1mdvmes5.2.x86_64.rpm \n 203cde43731b63729d1f7f6497033184 mes5/SRPMS/clamav-0.97.5-0.1mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFP3tnKmqjQ0CJFipgRAj4wAJ9eURS1mZYCZhkmUTVE/U8QAH47MwCgxQzf\nOUr1QL5Wsvt3KboLKCdYUhE=\n=1QL7\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "BID", "id": "52623" }, { "db": "VULHUB", "id": "VHN-54740" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-54740", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1459", "trust": 3.2 }, { "db": "BID", "id": "52623", "trust": 1.4 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80390", "trust": 1.1 }, { "db": "OSVDB", "id": "80392", "trust": 1.1 }, { "db": "OSVDB", "id": "80393", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80407", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001869", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19231", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201203-422", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "113878", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "115619", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "113895", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-54740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113841", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "id": "VAR-201203-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54740" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.445000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/" }, { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/csavdownload.html" }, { "title": "avast! Antivirus", "trust": 0.8, "url": "https://www.avast.co.jp/index" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "AntiVir", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Rising Antivirus", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Bitdefender", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "ClamAV", "trust": 0.8, "url": "http://www.clamav.net/lang/en/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "F-Prot Antivirus", "trust": 0.8, "url": "http://www.f-prot.com/index.html" }, { "title": "G Data AntiVirus", "trust": 0.8, "url": "http://www.gdata.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/consumer_home.php" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/us/products/web-gateway.aspx" }, { "title": "McAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Norman Antivirus", "trust": 0.8, "url": "http://www.norman.com/products/antivirus_antispyware/en" }, { "title": "nProtect Anti-Virus", "trust": 0.8, "url": "http://global.nprotect.com/product/avs.php" }, { "title": "openSUSE-SU-2012:0833", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "title": "Panda Antivirus", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Quick Heal", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Sophos Anti-Virus", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/index.html" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/index.html" }, { "title": "VBA32", "trust": 0.8, "url": "http://anti-virus.by/en/index.shtml" }, { "title": "VirusBuster", "trust": 0.8, "url": "http://www.virusbuster.hu/en" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-jp/windows/products/security-essentials" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "NVD", "id": "CVE-2012-1459" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52623" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:094" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80390" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80392" }, { "trust": 1.1, "url": "http://osvdb.org/80393" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80407" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1459" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1459" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19231" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1459" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1458" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.avast.com" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.avira.com/" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://eset.com" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.gdatasoftware.com" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "http://anti-virus.by/en/index.shtml" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-1482-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1457" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.3" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.3" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1015405" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1015337" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.2" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1482-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.96.5+dfsg-1ubuntu1.10.04.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.12.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/clamav/0.97.5+dfsg-1ubuntu0.11.04.1" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=changelog;hb=clamav-0.97.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1457" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1458" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54740" }, { "db": "BID", "id": "52623" }, { "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "NVD", "id": "CVE-2012-1459" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54740" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52623" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "date": "2012-08-17T02:36:21", "db": "PACKETSTORM", "id": "115619" }, { "date": "2012-06-20T03:33:06", "db": "PACKETSTORM", "id": "113895" }, { "date": "2012-06-20T02:54:11", "db": "PACKETSTORM", "id": "113878" }, { "date": "2012-06-19T00:56:02", "db": "PACKETSTORM", "id": "113841" }, { "date": "2012-03-21T10:11:49.597000", "db": "NVD", "id": "CVE-2012-1459" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULHUB", "id": "VHN-54740" }, { "date": "2015-04-13T22:00:00", "db": "BID", "id": "52623" }, { "date": "2012-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001869" }, { "date": "2018-01-18T02:29:13.273000", "db": "NVD", "id": "CVE-2012-1459" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-422" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "115619" }, { "db": "PACKETSTORM", "id": "113895" }, { "db": "PACKETSTORM", "id": "113878" }, { "db": "PACKETSTORM", "id": "113841" }, { "db": "CNNVD", "id": "CNNVD-201203-422" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001869" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-422" } ], "trust": 0.6 } }
var-201203-0377
Vulnerability from variot
The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. Multiple products CAB The file parser contains a vulnerability that can bypass malware detection. CVE May be split intoChanged by a third party coffFiles Have fields CAB Via files, malware detection can be bypassed. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. The following products are affected: McAfee 5.0.2.03300 TrendMicro-HouseCall 9.120.0.1004 Kaspersky 7.0.0.125 Sophos 4.61.0 TrendMicro 9.120.0.1004 McAfee-GW-Edition 2010.1C Emsisoft 5.1.0.1 eTrust-Vet 36.1.8511 Antiy-AVL 2.0.3.7 Microsoft 1.6402, Rising 22.83.00.03 Ikarus T3.1.1.97.0 Fortinet 4.2.254.0 Panda 10.0.2.7
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0377", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "anti-virus", "scope": "eq", "trust": 2.1, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "etrust vet antivirus", "scope": "eq", "trust": 1.8, "vendor": "ca", "version": "36.1.8511" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "security essentials", "scope": "eq", "trust": 1.8, "vendor": "microsoft", "version": "2.0" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.6, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "dr.web antivirus", "scope": "eq", "trust": 1.0, "vendor": "drweb", "version": "5.0.2.03300" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "dr.web antivirus", "scope": "eq", "trust": 0.8, "vendor": "doctor web", "version": "5.0.2.03300" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1.6402" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "mcafee", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "5.0.2.03300" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "associates etrust vet antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "36.1.8511" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" } ], "sources": [ { "db": "BID", "id": "52621" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "NVD", "id": "CVE-2012-1453" }, { "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:drweb:dr.web_antivirus:5.0.2.03300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_vet_antivirus:36.1.8511:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1453" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52621" } ], "trust": 0.3 }, "cve": "CVE-2012-1453", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1453", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54734", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1453", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-416", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54734", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54734" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "NVD", "id": "CVE-2012-1453" }, { "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. Multiple products CAB The file parser contains a vulnerability that can bypass malware detection. CVE May be split intoChanged by a third party coffFiles Have fields CAB Via files, malware detection can be bypassed. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. \nThe following products are affected:\nMcAfee 5.0.2.03300\nTrendMicro-HouseCall 9.120.0.1004\nKaspersky 7.0.0.125\nSophos 4.61.0\nTrendMicro 9.120.0.1004\nMcAfee-GW-Edition 2010.1C\nEmsisoft 5.1.0.1\neTrust-Vet 36.1.8511\nAntiy-AVL 2.0.3.7\nMicrosoft 1.6402,\nRising 22.83.00.03\nIkarus T3.1.1.97.0\nFortinet 4.2.254.0\nPanda 10.0.2.7", "sources": [ { "db": "NVD", "id": "CVE-2012-1453" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "BID", "id": "52621" }, { "db": "VULHUB", "id": "VHN-54734" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1453", "trust": 2.8 }, { "db": "BID", "id": "52621", "trust": 1.4 }, { "db": "OSVDB", "id": "80487", "trust": 1.1 }, { "db": "OSVDB", "id": "80482", "trust": 1.1 }, { "db": "OSVDB", "id": "80484", "trust": 1.1 }, { "db": "OSVDB", "id": "80483", "trust": 1.1 }, { "db": "OSVDB", "id": "80489", "trust": 1.1 }, { "db": "OSVDB", "id": "80486", "trust": 1.1 }, { "db": "OSVDB", "id": "80488", "trust": 1.1 }, { "db": "OSVDB", "id": "80485", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001867", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-416", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54734", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54734" }, { "db": "BID", "id": "52621" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "NVD", "id": "CVE-2012-1453" }, { "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "id": "VAR-201203-0377", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54734" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.012000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/en/avlsdk.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.vet.com.au/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.drweb.co.jp/" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "IKARUS virus.utilities", "trust": 0.8, "url": "http://www.ikarus.at/en/ngo-gov/products/virus_utilities/index.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-jp/windows/products/security-essentials" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/japan/products/web_gateway.asp" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001867" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54734" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "NVD", "id": "CVE-2012-1453" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52621" }, { "trust": 1.1, "url": "http://osvdb.org/80482" }, { "trust": 1.1, "url": "http://osvdb.org/80483" }, { "trust": 1.1, "url": "http://osvdb.org/80484" }, { "trust": 1.1, "url": "http://osvdb.org/80485" }, { "trust": 1.1, "url": "http://osvdb.org/80486" }, { "trust": 1.1, "url": "http://osvdb.org/80487" }, { "trust": 1.1, "url": "http://osvdb.org/80488" }, { "trust": 1.1, "url": "http://osvdb.org/80489" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1453" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1453" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.ca.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2012/mar/88" }, { "trust": 0.3, "url": "http://www.fortinet.com/" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.3, "url": "http://www.pandasecurity.com/usa/" }, { "trust": 0.3, "url": "http://www.quickheal.co.in/default.asp" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "/archive/1/522005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54734" }, { "db": "BID", "id": "52621" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "NVD", "id": "CVE-2012-1453" }, { "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54734" }, { "db": "BID", "id": "52621" }, { "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "db": "NVD", "id": "CVE-2012-1453" }, { "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54734" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52621" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "date": "2012-03-21T10:11:48.847000", "db": "NVD", "id": "CVE-2012-1453" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-06T00:00:00", "db": "VULHUB", "id": "VHN-54734" }, { "date": "2012-03-30T16:10:00", "db": "BID", "id": "52621" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001867" }, { "date": "2012-11-06T05:09:05.987000", "db": "NVD", "id": "CVE-2012-1453" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-416" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-416" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products CAB Vulnerability to bypass malware detection in file parser", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-416" } ], "trust": 0.6 } }
var-201203-0147
Vulnerability from variot
The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file containing an invalid block of data at the beginning. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ZIP parser implementations. Multiple products ZIP A file parser contains a vulnerability that can prevent malware detection. Different ZIP Parser If it is announced that there is also a problem with the implementation of CVE May be split.A third party includes an invalid block of data at the beginning ZIP Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0147", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "11.0" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52613" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "NVD", "id": "CVE-2012-1462" }, { "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1462" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52613" } ], "trust": 0.3 }, "cve": "CVE-2012-1462", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1462", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54743", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1462", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-425", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54743", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54743" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "NVD", "id": "CVE-2012-1462" }, { "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file containing an invalid block of data at the beginning. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ZIP parser implementations. Multiple products ZIP A file parser contains a vulnerability that can prevent malware detection. Different ZIP Parser If it is announced that there is also a problem with the implementation of CVE May be split.A third party includes an invalid block of data at the beginning ZIP Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection", "sources": [ { "db": "NVD", "id": "CVE-2012-1462" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "BID", "id": "52613" }, { "db": "VULHUB", "id": "VHN-54743" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1462", "trust": 2.8 }, { "db": "BID", "id": "52613", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2012-001871", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-425", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19217", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54743" }, { "db": "BID", "id": "52613" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "NVD", "id": "CVE-2012-1462" }, { "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "id": "VAR-201203-0147", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54743" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.311000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "Quick Heal", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001871" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54743" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "NVD", "id": "CVE-2012-1462" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52613" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74310" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1462" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1462" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19217" }, { "trust": 0.3, "url": "http://www.ahnlab.com" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://www.safenet-inc.com/data-protection/content-security-esafe/" }, { "trust": 0.3, "url": "http://www.fortinet.com/" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "/archive/1/522005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54743" }, { "db": "BID", "id": "52613" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "NVD", "id": "CVE-2012-1462" }, { "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54743" }, { "db": "BID", "id": "52613" }, { "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "db": "NVD", "id": "CVE-2012-1462" }, { "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54743" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52613" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "date": "2012-03-21T10:11:49.707000", "db": "NVD", "id": "CVE-2012-1462" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-54743" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52613" }, { "date": "2012-03-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001871" }, { "date": "2017-08-29T01:31:17.383000", "db": "NVD", "id": "CVE-2012-1462" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-425" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-425" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products ZIP Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001871" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-425" } ], "trust": 0.6 } }
var-200501-0297
Vulnerability from variot
McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. A remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. McAfee Anti-Virus is an antivirus software
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0297", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "1.4.1.13" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.1" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.3" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "1.4.5" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "1.5" }, { "model": "etrust ez armor", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.0" }, { "model": "inoculateit", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.0" }, { "model": "etrust ez armor", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.4" }, { "model": "etrust ez armor", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "2.3" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0932" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 }, "cve": "CVE-2004-0932", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9362", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0932", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200501-286", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9362", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "McAfee Anti-Virus Engine DATS drivers before 4398 released on Oct 13th 2004 and DATS Driver before 4397 October 6th 2004 allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. \nA remote attacker can craft a malicious zip archive and send it a vulnerable user. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. McAfee Anti-Virus is an antivirus software", "sources": [ { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9362" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9362", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-0932", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-286", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "35055", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9362", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "id": "VAR-200501-0297", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9362" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:28.954000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "McAfee AntiVirus zip Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146864" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0932" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9362" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0932" }, { "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9362" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0932" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9362" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0932" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-286" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "McAfee AntiVirus zip Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-286" } ], "trust": 0.6 } }
var-200501-0310
Vulnerability from variot
Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Kaspersky is a well-known antivirus software. Kaspersky 3.x and 4.x versions have issues when processing .zip files, resulting in a vulnerability to bypass antivirus checks.
II. DESCRIPTION
Remote exploitation of an exceptional condition error in multiple vendors' anti-virus software allows attackers to bypass security protections by evading virus detection. The .zip file format stores information about compressed files in two locations - a local header and a global header. The local header exists just before the compressed data of each file, and the global header exists at the end of the .zip archive. It is possible to modify the uncompressed size of archived files in both the local and global header without affecting functionality. This has been confirmed with both WinZip and Microsoft Compressed Folders. An attacker can compress a malicious payload and evade detection by some anti-virus software by modifying the uncompressed size within the local and global headers to zero.
III. ANALYSIS
Successful exploitation allows remote attackers to pass malicious payloads within a compressed archive to a target without being detected. Most anti-virus engines have the ability to scan content packaged with compressed archives. As such, users with up-to-date anti-virus software are more likely to open attachments and files if they are under the false impression that the archive was already scanned and found to not contain a virus.
IV. The Vendor Responses section of this advisory contains details on the status of specific vendor fixes for this issue.
V. WORKAROUND
Filter all compressed file archives (.zip) at border gateways, regardless of content.
VI. VENDOR RESPONSES
McAfee "The McAfee scan engine has always been a market leader in detection of viruses, worms and Trojans within compressed and archived file formats. As such the mechanism used for the detection of such payloads has been designed to ensure all archive files are thoroughly scanned at each nested level in the file to ensure that all appropriate parts of the file are scanned.
McAfee is aware of a proof of concept exploitation in Zip archive payloads where information in the local header part of the archive is modified.
The local header exists just before the compressed data of each file. It is possible to modify the uncompressed size of archived files in the local header without affecting functionality. Consequently there is the potential for a malicious payload to be hidden and avoid anti-virus detection by modifying the uncompressed size within the local headers to zero.
The techniques used by McAfee to analyze Zip archives have allowed a comprehensive solution for the Zip file format vulnerability to be provided to protect customers.
The latest update for the current 4320 McAfee Anti-Virus Engine DATS drivers (Version 4398 released on Oct 13th 2004) further enhances the protection afforded to McAfee customers against such potential exploits.
A DATS Driver update issued in Version 4397 (October 6th 2004) provided early protection for the same potential exploit targeted specifically for Gateway and Command line scanning.
If a detection of this type of exploit is found it will trigger the message "Found the Exploit-Zip Trojan!" to be displayed.
Updates for the DAT files mentioned above can be located at the following links:
Home (Retail) Users: http://download.mcafee.com/uk/updates/updates.asp
Business (Enterprise) Users: http://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1
It should be noted that whilst McAfee take the potential for this exploit to be used maliciously seriously, to date no evidence of such an exploit has been discovered. McAfee has provided additional protection through the DATS driver update however with usage of the comprehensive suite of anti-virus protection strategies provided by McAfee products, MacAfee are confident that this exploit presented no additional threat to its customers.
It should be noted that with McAfee on-access scanning active, such modification for malicious purposes to hide payloads only delays eventual detection - McAfee on-access detection will detect any payload with malicious intent as malware.
McAfee continues to focus on ensuring that customers receive maximum protection and provide a rapid response to all potential vulnerabilities thus ensuring customer satisfaction."
Computer Associates "With the assistance of iDEFENSE, Computer Associates has identified a medium-risk vulnerability in a shared component of eTrust Antivirus which may allow a specially crafted .ZIP file to bypass virus detection. A number of CA products embed this technology including solutions from eTrust, Brightstor and others.
Customers are encouraged to visit the CA support web site below for more information about this vulnerability, a list of products and platforms that are effected, and remediation procedures. http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp.
At Computer Associates, every reported exposure is handled with the utmost urgency. We strive to ensure that no customer is left in a vulnerable situation."
Kaspersky (09/24/2004) "...this bug for scanners based on 3.x-4.x engines will be fixed in next (not current) cumulative update.
For scanners based on new 5.0 engine we recommend you waiting for the release of our next maintenance pack. We are going to release it in October."
Sophos "A vulnerability has been discovered in Sophos's handling of Zip archive files, whereby a Zip file can be deliberately altered to prevent accurate scanning by Sophos anti-virus products of its contents.
Although theoretically a risk, Sophos has not seen any examples of malware attempting to employ this vulnerability.
Furthermore, The vulnerability does not prevent Sophos's desktop on-access scanner from correctly detecting viruses (and preventing actual infection) which manage to bypass the email gateway software, so the risks of infection are very small.
Sophos has enhanced its scan engine to deal with malformed Zip files. Version 3.87.0 of Sophos Anti-Virus on all operating system platforms except Windows 95/98/Me includes this fix and customers will be automatically updated to this version via EM Library from Wednesday 20 October 2004. Additionally, a version of the software will be available for download from the Sophos website from Friday 22 October 2004.
Sophos Anti-Virus for Windows 95/98/Me customers will be updated with the fix from version 3.88.0 (available from 24 November 2004).
Sophos thanks iDEFENSE for their assistance in identifying this vulnerability."
Eset "The vulnerability was caused by the fact that some archive compression/decompression software (including Winzip) incorrectly handles compressed files with deliberately damaged header fields, thus, in-fact, allowing creation of the damaged archive files, that could be automatically repaired on the victims computer without notifying the user.
Eset has made appropriate modifications to archive-scanning code to handle such kind of archives immediately after receiving notification from iDEFENSE. These changes are contained in archive-support module version 1.020, released on 16th September 2004 at 21:00 CET. The update was available for all clients with Automatic Virus-Signatures Update set."
RAV No vendor response
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues:
CAN-2004-0932 - McAfee CAN-2004-0933 - Computer Associates CAN-2004-0934 - Kaspersky CAN-2004-0937 - Sophos CAN-2004-0935 - Eset CAN-2004-0936 - RAV
These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.
VIII. DISCLOSURE TIMELINE
09/16/2004 Initial vendor notification 09/16/2004 iDEFENSE clients notified 10/18/2004 Coordinated public disclosure
IX. CREDIT
The discoverer of this vulnerability wishes to remain anonymous.
Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp
X. LEGAL NOTICES
Copyright © 2004 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0310", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "suse", "version": "9.2" }, { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0934" }, { "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0934" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-310" } ], "trust": 0.6 }, "cve": "CVE-2004-0934", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9364", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0934", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#968818", "trust": 0.8, "value": "7.59" }, { "author": "CNNVD", "id": "CNNVD-200501-310", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9364", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9364" }, { "db": "NVD", "id": "CVE-2004-0934" }, { "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kaspersky 3.x to 4.x allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Kaspersky is a well-known antivirus software. Kaspersky 3.x and 4.x versions have issues when processing .zip files, resulting in a vulnerability to bypass antivirus checks. \n\nII. DESCRIPTION\n\nRemote exploitation of an exceptional condition error in multiple\nvendors\u0027 anti-virus software allows attackers to bypass security\nprotections by evading virus detection. \nThe .zip file format stores information about compressed files in two\nlocations - a local header and a global header. The local header exists\njust before the compressed data of each file, and the global header\nexists at the end of the .zip archive. It is possible to modify the\nuncompressed size of archived files in both the local and global header\nwithout affecting functionality. This has been confirmed with both\nWinZip and Microsoft Compressed Folders. An attacker can compress a\nmalicious payload and evade detection by some anti-virus software by\nmodifying the uncompressed size within the local and global headers to\nzero. \n\nIII. ANALYSIS\n\nSuccessful exploitation allows remote attackers to pass malicious\npayloads within a compressed archive to a target without being detected. \nMost anti-virus engines have the ability to scan content packaged with\ncompressed archives. As such, users with up-to-date anti-virus software\nare more likely to open attachments and files if they are under the\nfalse impression that the archive was already scanned and found to not\ncontain a virus. \n\nIV. The Vendor Responses section of this\nadvisory contains details on the status of specific vendor fixes for\nthis issue. \n\nV. WORKAROUND\n\nFilter all compressed file archives (.zip) at border gateways,\nregardless of content. \n\nVI. VENDOR RESPONSES\n\nMcAfee\n\"The McAfee scan engine has always been a market leader in detection of\nviruses, worms and Trojans within compressed and archived file formats. \nAs such the mechanism used for the detection of such payloads has been\ndesigned to ensure all archive files are thoroughly scanned at each\nnested level in the file to ensure that all appropriate parts of the\nfile are scanned. \n\nMcAfee is aware of a proof of concept exploitation in Zip archive\npayloads where information in the local header part of the archive is\nmodified. \n\nThe local header exists just before the compressed data of each file. It\nis possible to modify the uncompressed size of archived files in the\nlocal header without affecting functionality. Consequently there is the\npotential for a malicious payload to be hidden and avoid anti-virus\ndetection by modifying the uncompressed size within the local headers to\nzero. \n\nThe techniques used by McAfee to analyze Zip archives have allowed a\ncomprehensive solution for the Zip file format vulnerability to be\nprovided to protect customers. \n\nThe latest update for the current 4320 McAfee Anti-Virus Engine DATS\ndrivers (Version 4398 released on Oct 13th 2004) further enhances the\nprotection afforded to McAfee customers against such potential exploits. \n\nA DATS Driver update issued in Version 4397 (October 6th 2004) provided\nearly protection for the same potential exploit targeted specifically\nfor Gateway and Command line scanning. \n\nIf a detection of this type of exploit is found it will trigger the\nmessage \"Found the Exploit-Zip Trojan!\" to be displayed. \n\nUpdates for the DAT files mentioned above can be located at the\nfollowing links:\n\nHome (Retail) Users:\nhttp://download.mcafee.com/uk/updates/updates.asp\n\nBusiness (Enterprise) Users:\nhttp://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1\n\nIt should be noted that whilst McAfee take the potential for this\nexploit to be used maliciously seriously, to date no evidence of such an\nexploit has been discovered. McAfee has provided additional protection\nthrough the DATS driver update however with usage of the comprehensive\nsuite of anti-virus protection strategies provided by McAfee products,\nMacAfee are confident that this exploit presented no additional threat\nto its customers. \n\nIt should be noted that with McAfee on-access scanning active, such\nmodification for malicious purposes to hide payloads only delays\neventual detection - McAfee on-access detection will detect any payload\nwith malicious intent as malware. \n\nMcAfee continues to focus on ensuring that customers receive maximum\nprotection and provide a rapid response to all potential vulnerabilities\nthus ensuring customer satisfaction.\"\n\nComputer Associates\n\"With the assistance of iDEFENSE, Computer Associates has identified a\nmedium-risk vulnerability in a shared component of eTrust Antivirus\nwhich may allow a specially crafted .ZIP file to bypass virus detection. \nA number of CA products embed this technology including solutions from\neTrust, Brightstor and others. \n\nCustomers are encouraged to visit the CA support web site below for more\ninformation about this vulnerability, a list of products and platforms\nthat are effected, and remediation procedures. \nhttp://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp. \n\nAt Computer Associates, every reported exposure is handled with the\nutmost urgency. We strive to ensure that no customer is left in a\nvulnerable situation.\"\n\nKaspersky\n(09/24/2004)\n\"...this bug for scanners based on 3.x-4.x engines will be fixed in next\n(not current) cumulative update. \n\nFor scanners based on new 5.0 engine we recommend you waiting for the\nrelease of our next maintenance pack. We are going to release it in\nOctober.\"\n\nSophos\n\"A vulnerability has been discovered in Sophos\u0027s handling of Zip archive\nfiles, whereby a Zip file can be deliberately altered to prevent\naccurate scanning by Sophos anti-virus products of its contents. \n\nAlthough theoretically a risk, Sophos has not seen any examples of\nmalware attempting to employ this vulnerability. \n\nFurthermore, The vulnerability does not prevent Sophos\u0027s desktop\non-access scanner from correctly detecting viruses (and preventing\nactual infection) which manage to bypass the email gateway software, so\nthe risks of infection are very small. \n\nSophos has enhanced its scan engine to deal with malformed Zip files. \nVersion 3.87.0 of Sophos Anti-Virus on all operating system platforms\nexcept Windows 95/98/Me includes this fix and customers will be\nautomatically updated to this version via EM Library from Wednesday 20\nOctober 2004. Additionally, a version of the software will be available\nfor download from the Sophos website from Friday 22 October 2004. \n\nSophos Anti-Virus for Windows 95/98/Me customers will be updated with\nthe fix from version 3.88.0 (available from 24 November 2004). \n\nSophos thanks iDEFENSE for their assistance in identifying this\nvulnerability.\"\n\nEset\n\"The vulnerability was caused by the fact that some archive\ncompression/decompression software (including Winzip) incorrectly\nhandles compressed files with deliberately damaged header fields, thus,\nin-fact, allowing creation of the damaged archive files, that could be\nautomatically repaired on the victims computer without notifying the\nuser. \n\nEset has made appropriate modifications to archive-scanning code to\nhandle such kind of archives immediately after receiving notification\nfrom iDEFENSE. These changes are contained in archive-support module\nversion 1.020, released on 16th September 2004 at 21:00 CET. The update\nwas available for all clients with Automatic Virus-Signatures Update\nset.\"\n\nRAV\nNo vendor response\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nfollowing names to these issues:\n\nCAN-2004-0932 - McAfee\nCAN-2004-0933 - Computer Associates\nCAN-2004-0934 - Kaspersky\nCAN-2004-0937 - Sophos\nCAN-2004-0935 - Eset\nCAN-2004-0936 - RAV\n\nThese are candidates for inclusion in the CVE list\n(http://cve.mitre.org), which standardizes names for security problems. \n\nVIII. DISCLOSURE TIMELINE\n\n09/16/2004 Initial vendor notification\n09/16/2004 iDEFENSE clients notified\n10/18/2004 Coordinated public disclosure\n\nIX. CREDIT\n\nThe discoverer of this vulnerability wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nX. LEGAL NOTICES\n\nCopyright \u00a9 2004 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information", "sources": [ { "db": "NVD", "id": "CVE-2004-0934" }, { "db": "CERT/CC", "id": "VU#968818" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9364" }, { "db": "PACKETSTORM", "id": "34757" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9364", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9364" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#968818", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2004-0934", "trust": 2.1 }, { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-310", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "34757", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9364", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9364" }, { "db": "BID", "id": "11448" }, { "db": "PACKETSTORM", "id": "34757" }, { "db": "NVD", "id": "CVE-2004-0934" }, { "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "id": "VAR-200501-0310", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9364" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:28.981000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Kaspersky zip Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146861" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0934" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/968818" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html" }, { "trust": 0.8, "url": "http://rt.cpan.org/noauth/bug.html?id=8077" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=153" }, { "trust": 0.4, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0934" }, { "trust": 0.1, "url": "http://www.idefense.com/poi/teams/vcp.jsp" }, { "trust": 0.1, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp." }, { "trust": 0.1, "url": "http://www.mcafeesecurity.com/uk/downloads/updates/dat.asp?id=1" }, { "trust": 0.1, "url": "http://cve.mitre.org)," } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9364" }, { "db": "BID", "id": "11448" }, { "db": "PACKETSTORM", "id": "34757" }, { "db": "NVD", "id": "CVE-2004-0934" }, { "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9364" }, { "db": "BID", "id": "11448" }, { "db": "PACKETSTORM", "id": "34757" }, { "db": "NVD", "id": "CVE-2004-0934" }, { "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-10T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9364" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2004-10-26T03:28:25", "db": "PACKETSTORM", "id": "34757" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0934" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-14T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9364" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0934" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-310" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-310" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anti-virus software may not properly scan malformed zip archives", "sources": [ { "db": "CERT/CC", "id": "VU#968818" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-310" } ], "trust": 0.6 } }
var-201203-0367
Vulnerability from variot
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1425
- Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1430 13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1442
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1446
- 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C, Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402, Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1453
- 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection.
Affected products - AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1456
- If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "clamav", "scope": "eq", "trust": 1.8, "vendor": "clamav", "version": "0.96.4" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "virusbuster", "scope": "eq", "trust": 1.8, "vendor": "virusbuster", "version": "13.6.151.0" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "security essentials", "scope": "eq", "trust": 1.8, "vendor": "microsoft", "version": "2.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "v3 internet security", "scope": "eq", "trust": 1.0, "vendor": "ahnlab", "version": "2011.01.18.00" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "5.0.677.0" }, { "model": "housecall", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "g data antivirus", "scope": "eq", "trust": 1.0, "vendor": "gdata", "version": "21" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivir", "scope": "eq", "trust": 1.0, "vendor": "avira", "version": "7.11.1.163" }, { "model": "avast antivirus", "scope": "eq", "trust": 1.0, "vendor": "alwil", "version": "4.8.1351.0" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "4.8.1351.0" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "avast s r o", "version": "5.0.677.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "avira", "version": "7.11.1.163" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "g data", "version": "21" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "v3 internet security", "scope": "eq", "trust": 0.8, "vendor": "unlab", "version": "2011.01.18.00" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "virusbuster", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "13.6.1510" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "nprotect", "scope": "eq", "trust": 0.3, "vendor": "inca", "version": "2011-01-17.01" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "data software gdata", "scope": "eq", "trust": 0.3, "vendor": "g", "version": "21" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "antivir engine", "scope": "eq", "trust": 0.3, "vendor": "avira", "version": "7.11.1163" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "avast5 antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "5.0.6770" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "avast", "version": "4.8.1351.0" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" }, { "model": "engine", "scope": "eq", "trust": 0.3, "vendor": "ahnlab", "version": "v32011.01.18.00" } ], "sources": [ { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1443" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52612" } ], "trust": 0.3 }, "cve": "CVE-2012-1443", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1443", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54724", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1443", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-407", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54724", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations. Multiple products RAR A file parser contains a vulnerability that can prevent malware detection. Different RAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By the attacker, MZ Has a character sequence starting with RAR Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Sophos Anti-Virus is a set of anti-virus software for various operating systems from Sophos, UK. The software detects and removes viruses, spyware, trojans and worms in real time, ensuring comprehensive network protection for desktops and laptops. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,\n Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004 \n\n CVE no - \n CVE-2012-1425\n\n8. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, \n Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1430\n13. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, \n Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1442\n\n25. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, \n Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, \n McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, \n Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,\n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1446\n\n29. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, \n Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,\n Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,\n Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1453\n\n36. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. \n\n Affected products -\n AVG 10.0.0.1190, CAT-QuickHeal 11.00, Comodo 7424, Emsisoft 5.1.0.1,\n eSafe 7.0.17.0, F-Prot 4.6.2.117,Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004\n\n CVE no - \n CVE-2012-1456\n\n39. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "BID", "id": "52612" }, { "db": "VULHUB", "id": "VHN-54724" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1443", "trust": 2.9 }, { "db": "BID", "id": "52612", "trust": 1.4 }, { "db": "OSVDB", "id": "80469", "trust": 1.1 }, { "db": "OSVDB", "id": "80461", "trust": 1.1 }, { "db": "OSVDB", "id": "80454", "trust": 1.1 }, { "db": "OSVDB", "id": "80455", "trust": 1.1 }, { "db": "OSVDB", "id": "80467", "trust": 1.1 }, { "db": "OSVDB", "id": "80468", "trust": 1.1 }, { "db": "OSVDB", "id": "80471", "trust": 1.1 }, { "db": "OSVDB", "id": "80456", "trust": 1.1 }, { "db": "OSVDB", "id": "80459", "trust": 1.1 }, { "db": "OSVDB", "id": "80472", "trust": 1.1 }, { "db": "OSVDB", "id": "80470", "trust": 1.1 }, { "db": "OSVDB", "id": "80457", "trust": 1.1 }, { "db": "OSVDB", "id": "80460", "trust": 1.1 }, { "db": "OSVDB", "id": "80458", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001895", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-407", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19198", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54724", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "id": "VAR-201203-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54724" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:12.911000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/en/avlsdk.html" }, { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/csavdownload.html" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.avast.co.jp/index" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.avira.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.clamav.net/lang/en/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.gdata.co.jp/" }, { "title": "IKARUS virus.utilities", "trust": 0.8, "url": "http://www.ikarus.at/en/ngo-gov/products/virus_utilities/index.html" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "title": "MacAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "nProtect Anti-Virus", "trust": 0.8, "url": "http://global.nprotect.com/product/avs.php" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/" }, { "title": "Top Page", "trust": 0.8, "url": "http://anti-virus.by/en" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.virusbuster.hu/en" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "V3 Internet Security", "trust": 0.8, "url": "http://www.ahnlab.co.jp/product_service/product/b2b/v3is8.asp" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" }, { "title": "Microsoft Security Essentials", "trust": 0.8, "url": "http://windows.microsoft.com/ja-jp/windows/products/security-essentials" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/japan/products/web_gateway.asp" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "NVD", "id": "CVE-2012-1443" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52612" }, { "trust": 1.1, "url": "http://osvdb.org/80454" }, { "trust": 1.1, "url": "http://osvdb.org/80455" }, { "trust": 1.1, "url": "http://osvdb.org/80456" }, { "trust": 1.1, "url": "http://osvdb.org/80457" }, { "trust": 1.1, "url": "http://osvdb.org/80458" }, { "trust": 1.1, "url": "http://osvdb.org/80459" }, { "trust": 1.1, "url": "http://osvdb.org/80460" }, { "trust": 1.1, "url": "http://osvdb.org/80461" }, { "trust": 1.1, "url": "http://osvdb.org/80467" }, { "trust": 1.1, "url": "http://osvdb.org/80468" }, { "trust": 1.1, "url": "http://osvdb.org/80469" }, { "trust": 1.1, "url": "http://osvdb.org/80470" }, { "trust": 1.1, "url": "http://osvdb.org/80471" }, { "trust": 1.1, "url": "http://osvdb.org/80472" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1443" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1443" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19198" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2012/mar/88" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54724" }, { "db": "BID", "id": "52612" }, { "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1443" }, { "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54724" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52612" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-21T10:11:48.083000", "db": "NVD", "id": "CVE-2012-1443" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-06T00:00:00", "db": "VULHUB", "id": "VHN-54724" }, { "date": "2015-03-19T08:41:00", "db": "BID", "id": "52612" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001895" }, { "date": "2012-11-06T05:09:04.360000", "db": "NVD", "id": "CVE-2012-1443" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-407" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-407" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products RAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-407" } ], "trust": 0.6 } }
var-200502-0003
Vulnerability from variot
Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Many anti-virus vendors have problems when processing .zip files. Remote attackers can use this vulnerability to embed malicious code to bypass the inspection of anti-virus software. The problem lies in the analysis of the header field of the .zip file. The information stored in the compressed file in the .zip file format is divided into two parts, one is the local (local) header field, and the other is the global (global) header field. Local header field data exists before the compressed data file, while global fields exist at the end of the .zip file. Attackers can modify the uncompressed byte size value of the archive file in the local and global header field information without affecting the function, but many antivirus vendors' software cannot handle such archive files well. If the compressed payload contains malicious code, it cannot be detected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200502-0003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "suse", "version": "9.2" }, { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0937" }, { "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0937" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200502-042" } ], "trust": 0.6 }, "cve": "CVE-2004-0937", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9367", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0937", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#968818", "trust": 0.8, "value": "7.59" }, { "author": "CNNVD", "id": "CNNVD-200502-042", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9367", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9367" }, { "db": "NVD", "id": "CVE-2004-0937" }, { "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sophos Anti-Virus before 3.87.0, and Sophos Anti-Virus for Windows 95, 98, and Me before 3.88.0, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Many anti-virus vendors have problems when processing .zip files. Remote attackers can use this vulnerability to embed malicious code to bypass the inspection of anti-virus software. The problem lies in the analysis of the header field of the .zip file. The information stored in the compressed file in the .zip file format is divided into two parts, one is the local (local) header field, and the other is the global (global) header field. Local header field data exists before the compressed data file, while global fields exist at the end of the .zip file. Attackers can modify the uncompressed byte size value of the archive file in the local and global header field information without affecting the function, but many antivirus vendors\u0027 software cannot handle such archive files well. If the compressed payload contains malicious code, it cannot be detected", "sources": [ { "db": "NVD", "id": "CVE-2004-0937" }, { "db": "CERT/CC", "id": "VU#968818" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9367" } ], "trust": 1.98 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9367", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9367" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#968818", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2004-0937", "trust": 2.0 }, { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200502-042", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9367", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9367" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0937" }, { "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "id": "VAR-200502-0003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9367" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:29.016000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Many anti-virus vendors software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146859" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0937" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/968818" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html" }, { "trust": 0.8, "url": "http://rt.cpan.org/noauth/bug.html?id=8077" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=153" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9367" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0937" }, { "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9367" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0937" }, { "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-10T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2005-02-09T00:00:00", "db": "VULHUB", "id": "VHN-9367" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2005-02-09T05:00:00", "db": "NVD", "id": "CVE-2004-0937" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-14T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9367" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0937" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200502-042" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200502-042" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anti-virus software may not properly scan malformed zip archives", "sources": [ { "db": "CERT/CC", "id": "VU#968818" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200502-042" } ], "trust": 0.6 } }
var-201203-0146
Vulnerability from variot
The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations. Multiple products Gzip A file parser contains a vulnerability that can prevent malware detection. Different Gzip If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Have multiple compressed streams by a third party .tar.gz Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0146", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "housecall", "scope": "eq", "trust": 1.6, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.0, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "k7computing", "version": "9.77.3565" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 1.0, "vendor": "anti virus", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "k7 computing", "version": "9.77.3565" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "vba32", "scope": "eq", "trust": 0.8, "vendor": "virusblokada", "version": "3.12.14.2" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "vba32", "scope": "eq", "trust": 0.3, "vendor": "virusblokada", "version": "3.12.142" }, { "model": "trend micro", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "housecall", "scope": "eq", "trust": 0.3, "vendor": "trend micro", "version": "9.1201004" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "computing pvt ltd k7antivirus", "scope": "eq", "trust": 0.3, "vendor": "k7", "version": "9.77.3565" }, { "model": "jiangmin", "scope": "eq", "trust": 0.3, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "nod32", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "5795" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "comodo", "version": "7424" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" } ], "sources": [ { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1461" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52626" } ], "trust": 0.3 }, "cve": "CVE-2012-1461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1461", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54742", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1461", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-424", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations. Multiple products Gzip A file parser contains a vulnerability that can prevent malware detection. Different Gzip If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Have multiple compressed streams by a third party .tar.gz Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection", "sources": [ { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "BID", "id": "52626" }, { "db": "VULHUB", "id": "VHN-54742" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1461", "trust": 2.8 }, { "db": "BID", "id": "52626", "trust": 1.4 }, { "db": "OSVDB", "id": "80510", "trust": 1.1 }, { "db": "OSVDB", "id": "80501", "trust": 1.1 }, { "db": "OSVDB", "id": "80500", "trust": 1.1 }, { "db": "OSVDB", "id": "80504", "trust": 1.1 }, { "db": "OSVDB", "id": "80505", "trust": 1.1 }, { "db": "OSVDB", "id": "80503", "trust": 1.1 }, { "db": "OSVDB", "id": "80502", "trust": 1.1 }, { "db": "OSVDB", "id": "80506", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001901", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-424", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19199", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "id": "VAR-201203-0146", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54742" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:12.877000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Command Antivirus", "trust": 0.8, "url": "http://www.authentium.com/command/csavdownload.html" }, { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Rising Antivirus", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Bitdefender", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "K7 AntiVirus", "trust": 0.8, "url": "http://www.k7computing.com/en/consumer_home.php" }, { "title": "McAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/us/products/web-gateway.aspx" }, { "title": "Norman Antivirus", "trust": 0.8, "url": "http://www.norman.com/products/antivirus_antispyware/en" }, { "title": "Sophos Anti-Virus", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/index.html" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/tools/housecall/index.html" }, { "title": "VBA32", "trust": 0.8, "url": "http://anti-virus.by/en/index.shtml" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001901" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52626" }, { "trust": 1.1, "url": "http://osvdb.org/80500" }, { "trust": 1.1, "url": "http://osvdb.org/80501" }, { "trust": 1.1, "url": "http://osvdb.org/80502" }, { "trust": 1.1, "url": "http://osvdb.org/80503" }, { "trust": 1.1, "url": "http://osvdb.org/80504" }, { "trust": 1.1, "url": "http://osvdb.org/80505" }, { "trust": 1.1, "url": "http://osvdb.org/80506" }, { "trust": 1.1, "url": "http://osvdb.org/80510" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1461" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1461" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19199" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://global.jiangmin.com/" }, { "trust": 0.3, "url": "http://www.k7computing.com/en/product/k7-antivirusplus.php" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.3, "url": "/archive/1/522005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54742" }, { "db": "BID", "id": "52626" }, { "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "db": "NVD", "id": "CVE-2012-1461" }, { "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54742" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52626" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "date": "2012-03-21T10:11:49.677000", "db": "NVD", "id": "CVE-2012-1461" }, { "date": "2012-03-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-06T00:00:00", "db": "VULHUB", "id": "VHN-54742" }, { "date": "2012-03-30T16:20:00", "db": "BID", "id": "52626" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001901" }, { "date": "2012-11-06T05:09:07.283000", "db": "NVD", "id": "CVE-2012-1461" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-424" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-424" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products Gzip Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001901" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-424" } ], "trust": 0.6 } }
var-201203-0390
Vulnerability from variot
The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.A specific position by a third party \19\04\00\10 With the character sequence ELF Malware detection may be avoided via files. Multiple Antivirus products are prone prone to a vulnerability that may allow an attacker to bypass on-demand scans. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection. If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0390", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "antivirus", "scope": "eq", "trust": 1.6, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 0.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "nprotect", "scope": "eq", "trust": 0.3, "vendor": "inca", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" } ], "sources": [ { "db": "BID", "id": "52589" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "NVD", "id": "CVE-2012-1430" }, { "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-secure:anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1430" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52589" }, { "db": "CNNVD", "id": "CNNVD-201203-378" } ], "trust": 0.9 }, "cve": "CVE-2012-1430", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1430", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54711", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1430", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-378", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54711", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2012-1430", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54711" }, { "db": "VULMON", "id": "CVE-2012-1430" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "NVD", "id": "CVE-2012-1430" }, { "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\19\\04\\00\\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.A specific position by a third party \\19\\04\\00\\10 With the character sequence ELF Malware detection may be avoided via files. Multiple Antivirus products are prone prone to a vulnerability that may allow an attacker to bypass on-demand scans. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1430" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "BID", "id": "52589" }, { "db": "VULHUB", "id": "VHN-54711" }, { "db": "VULMON", "id": "CVE-2012-1430" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1430", "trust": 3.0 }, { "db": "BID", "id": "52589", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001892", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-378", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "NSFOCUS", "id": "19116", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54711", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2012-1430", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54711" }, { "db": "VULMON", "id": "CVE-2012-1430" }, { "db": "BID", "id": "52589" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1430" }, { "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "id": "VAR-201203-0390", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54711" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.051000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.comodo.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://global.nprotect.com/index.php" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.aladdin.co.jp/index.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/default.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.mcafee.com/japan/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001892" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54711" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "NVD", "id": "CVE-2012-1430" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.8, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1430" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1430" }, { "trust": 0.7, "url": "http://www.securityfocus.com/bid/52589" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19116" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.comodo.com/" }, { "trust": 0.3, "url": "http://www.safenet-inc.com/data-protection/content-security-esafe/" }, { "trust": 0.3, "url": "http://www.f-secure.com/" }, { "trust": 0.3, "url": "http://global.nprotect.com/index.php" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54711" }, { "db": "VULMON", "id": "CVE-2012-1430" }, { "db": "BID", "id": "52589" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1430" }, { "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54711" }, { "db": "VULMON", "id": "CVE-2012-1430" }, { "db": "BID", "id": "52589" }, { "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1430" }, { "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54711" }, { "date": "2012-03-21T00:00:00", "db": "VULMON", "id": "CVE-2012-1430" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52589" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-21T10:11:47.583000", "db": "NVD", "id": "CVE-2012-1430" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-04-13T00:00:00", "db": "VULHUB", "id": "VHN-54711" }, { "date": "2012-04-13T00:00:00", "db": "VULMON", "id": "CVE-2012-1430" }, { "date": "2012-03-30T16:10:00", "db": "BID", "id": "52589" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001892" }, { "date": "2012-04-13T04:00:00", "db": "NVD", "id": "CVE-2012-1430" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-378" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-378" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products ELF Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001892" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-378" } ], "trust": 0.6 } }
var-201203-0380
Vulnerability from variot
The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party ZIP File attached TAR Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. The following products are affected: AVG AVG Anti-Virus 10.0.0.1190 Quick Heal Technologies CAT-QuickHeal 11.00 Comodo AntiVirus 7424 Emsisoft Antivirus 5.1.0.1 eSafe Antivirus 7.0.17.0 Frisk Software F-Prot Antivirus 4.6.2.117 Fortinet Antivirus 4.2.254.0 Ikarus Antivirus T3.1.1.97.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0380", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "avg", "version": "10.0.0.1190" }, { "model": "anti-malware", "scope": "eq", "trust": 1.8, "vendor": "emsisoft", "version": "5.1.0.1" }, { "model": "virus utilities t3 command line scanner", "scope": "eq", "trust": 1.8, "vendor": "ikarus", "version": "1.1.97.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "jiangmin", "version": "13.0.900" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "housecall", "scope": "eq", "trust": 1.6, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "trend micro antivirus", "scope": "eq", "trust": 1.6, "vendor": "trendmicro", "version": "9.120.0.1004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.0, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "nod32 anti-virus", "scope": "eq", "trust": 0.8, "vendor": "eset", "version": "5795" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "housecall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "9.120.0.1004" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus t3.1.1.97.0", "scope": null, "trust": 0.3, "vendor": "ikarus", "version": null }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "fortinet", "version": "4.2.2540" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "emsisoft", "version": "5.11" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "avg", "version": "10.01190" } ], "sources": [ { "db": "BID", "id": "52608" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "NVD", "id": "CVE-2012-1456" }, { "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1456" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52608" } ], "trust": 0.3 }, "cve": "CVE-2012-1456", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1456", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54737", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1456", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-419", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54737" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "NVD", "id": "CVE-2012-1456" }, { "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. Multiple products TAR A file parser contains a vulnerability that can prevent malware detection. Different TAR If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.By a third party ZIP File attached TAR Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. \nThe following products are affected:\nAVG AVG Anti-Virus 10.0.0.1190\nQuick Heal Technologies CAT-QuickHeal 11.00\nComodo AntiVirus 7424\nEmsisoft Antivirus 5.1.0.1\neSafe Antivirus 7.0.17.0\nFrisk Software F-Prot Antivirus 4.6.2.117\nFortinet Antivirus 4.2.254.0\nIkarus Antivirus T3.1.1.97.0", "sources": [ { "db": "NVD", "id": "CVE-2012-1456" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "BID", "id": "52608" }, { "db": "VULHUB", "id": "VHN-54737" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1456", "trust": 2.8 }, { "db": "BID", "id": "52608", "trust": 1.4 }, { "db": "OSVDB", "id": "80396", "trust": 1.1 }, { "db": "OSVDB", "id": "80389", "trust": 1.1 }, { "db": "OSVDB", "id": "80391", "trust": 1.1 }, { "db": "OSVDB", "id": "80403", "trust": 1.1 }, { "db": "OSVDB", "id": "80395", "trust": 1.1 }, { "db": "OSVDB", "id": "80390", "trust": 1.1 }, { "db": "OSVDB", "id": "80406", "trust": 1.1 }, { "db": "OSVDB", "id": "80409", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001900", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-419", "trust": 0.7 }, { "db": "NSFOCUS", "id": "19212", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54737", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54737" }, { "db": "BID", "id": "52608" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "NVD", "id": "CVE-2012-1456" }, { "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "id": "VAR-201203-0380", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54737" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:11.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVG Anti-Virus", "trust": 0.8, "url": "http://www.avgjapan.com/home-small-office-security/buy-antivirus" }, { "title": "Rising Antivirus", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Comodo Antivirus", "trust": 0.8, "url": "http://www.comodo.com/home/internet-security/antivirus.php" }, { "title": "Emsisoft Anti-Malware", "trust": 0.8, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "title": "ESET NOD32\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9", "trust": 0.8, "url": "http://www.eset.com/us/" }, { "title": "Fortinet Antivirus", "trust": 0.8, "url": "http://www.fortinet.com/solutions/antivirus.html" }, { "title": "F-Prot Antivirus", "trust": 0.8, "url": "http://www.f-prot.com/index.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ikarus.at/en/" }, { "title": "Jiangmin Antivirus", "trust": 0.8, "url": "http://global.jiangmin.com/" }, { "title": "McAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/us/products/web-gateway.aspx" }, { "title": "Norman Antivirus", "trust": 0.8, "url": "http://www.norman.com/products/antivirus_antispyware/en" }, { "title": "Panda Antivirus", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "Quick Heal", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Sophos Anti-Virus", "trust": 0.8, "url": "http://www.sophos.com/ja-jp/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "Top Page", "trust": 0.8, "url": "http://jp.trendmicro.com/jp/home/index.html" }, { "title": "Trend Micro HouseCall", "trust": 0.8, "url": "http://housecall.trendmicro.com/" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001900" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54737" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "NVD", "id": "CVE-2012-1456" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52608" }, { "trust": 1.1, "url": "http://osvdb.org/80389" }, { "trust": 1.1, "url": "http://osvdb.org/80390" }, { "trust": 1.1, "url": "http://osvdb.org/80391" }, { "trust": 1.1, "url": "http://osvdb.org/80395" }, { "trust": 1.1, "url": "http://osvdb.org/80396" }, { "trust": 1.1, "url": "http://osvdb.org/80403" }, { "trust": 1.1, "url": "http://osvdb.org/80406" }, { "trust": 1.1, "url": "http://osvdb.org/80409" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1456" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1456" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/19212" }, { "trust": 0.3, "url": "http://www.avg.com" }, { "trust": 0.3, "url": "http://www.comodo.com/" }, { "trust": 0.3, "url": "http://www.emsisoft.com/en/software/antimalware/" }, { "trust": 0.3, "url": "http://www.safenet-inc.com/data-protection/content-security-esafe/" }, { "trust": 0.3, "url": "http://www.fortinet.com/" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://www.ikarus.at" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "/archive/1/522005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54737" }, { "db": "BID", "id": "52608" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "NVD", "id": "CVE-2012-1456" }, { "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54737" }, { "db": "BID", "id": "52608" }, { "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "db": "NVD", "id": "CVE-2012-1456" }, { "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54737" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52608" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "date": "2012-03-21T10:11:49.240000", "db": "NVD", "id": "CVE-2012-1456" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-54737" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52608" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001900" }, { "date": "2017-08-29T01:31:17.133000", "db": "NVD", "id": "CVE-2012-1456" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-419" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-419" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products TAR Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001900" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-419" } ], "trust": 0.6 } }
var-201203-0402
Vulnerability from variot
The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Changed by a third party class With field ELF Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection. 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection. 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection. If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0402", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.6, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" } ], "sources": [ { "db": "BID", "id": "52598" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "NVD", "id": "CVE-2012-1442" }, { "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1442" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52598" } ], "trust": 0.3 }, "cve": "CVE-2012-1442", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1442", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54723", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1442", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-406", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54723", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54723" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "NVD", "id": "CVE-2012-1442" }, { "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Changed by a third party class With field ELF Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1442" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "BID", "id": "52598" }, { "db": "VULHUB", "id": "VHN-54723" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1442", "trust": 2.9 }, { "db": "BID", "id": "52598", "trust": 1.4 }, { "db": "OSVDB", "id": "80428", "trust": 1.1 }, { "db": "OSVDB", "id": "80426", "trust": 1.1 }, { "db": "OSVDB", "id": "80427", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001894", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-406", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54723", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54723" }, { "db": "BID", "id": "52598" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1442" }, { "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "id": "VAR-201203-0402", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54723" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.374000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/en/avlsdk.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "MacAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/japan/products/web_gateway.asp" }, { "title": "F-Secure Anti-Virus", "trust": 0.8, "url": "http://www.f-secure.com/ja/web/home_jp/protection/anti-virus/overview" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001894" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54723" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "NVD", "id": "CVE-2012-1442" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52598" }, { "trust": 1.1, "url": "http://osvdb.org/80426" }, { "trust": 1.1, "url": "http://osvdb.org/80427" }, { "trust": 1.1, "url": "http://osvdb.org/80428" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1442" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1442" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.f-secure.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.pandasecurity.com/usa/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54723" }, { "db": "BID", "id": "52598" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1442" }, { "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54723" }, { "db": "BID", "id": "52598" }, { "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1442" }, { "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54723" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52598" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-21T10:11:48.037000", "db": "NVD", "id": "CVE-2012-1442" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-28T00:00:00", "db": "VULHUB", "id": "VHN-54723" }, { "date": "2012-03-30T16:10:00", "db": "BID", "id": "52598" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001894" }, { "date": "2012-07-28T03:30:34.523000", "db": "NVD", "id": "CVE-2012-1442" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-406" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-406" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products ELF Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-406" } ], "trust": 0.6 } }
var-200501-0012
Vulnerability from variot
RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. RAV is an antivirus software. Due to a problem with the processing of zip files in RAV, zip files can bypass antivirus detection
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0012", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "suse", "version": "9.2" }, { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0936" }, { "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0936" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-300" } ], "trust": 0.6 }, "cve": "CVE-2004-0936", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9366", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0936", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#968818", "trust": 0.8, "value": "7.59" }, { "author": "CNNVD", "id": "CNNVD-200501-300", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9366", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9366" }, { "db": "NVD", "id": "CVE-2004-0936" }, { "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "RAV antivirus allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. RAV is an antivirus software. Due to a problem with the processing of zip files in RAV, zip files can bypass antivirus detection", "sources": [ { "db": "NVD", "id": "CVE-2004-0936" }, { "db": "CERT/CC", "id": "VU#968818" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9366" } ], "trust": 1.98 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9366", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9366" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#968818", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2004-0936", "trust": 2.0 }, { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-300", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9366", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9366" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0936" }, { "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "id": "VAR-200501-0012", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9366" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:29.128000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RAV AntiVirus zip Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146862" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0936" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/968818" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html" }, { "trust": 0.8, "url": "http://rt.cpan.org/noauth/bug.html?id=8077" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=153" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9366" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0936" }, { "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9366" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0936" }, { "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-10T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9366" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0936" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-14T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9366" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0936" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-300" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-300" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anti-virus software may not properly scan malformed zip archives", "sources": [ { "db": "CERT/CC", "id": "VU#968818" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-300" } ], "trust": 0.6 } }
var-201203-0370
Vulnerability from variot
The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Norman Antivirus 6.06.12, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, McAfee Gateway (formerly Webwasher) 2010.1C, Sophos Anti-Virus 4.61.0, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified encoding field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Changed by a third party encoding With field ELF Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection. Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1430 13. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection. Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection. 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection. If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0370", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "avl sdk", "scope": "eq", "trust": 1.8, "vendor": "antiy", "version": "2.0.3.7" }, { "model": "etrust vet antivirus", "scope": "eq", "trust": 1.8, "vendor": "ca", "version": "36.1.8511" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "pc tools", "version": "7.0.3.5" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "kaspersky", "version": "7.0.0.125" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.8, "vendor": "fortinet", "version": "4.2.254.0" }, { "model": "scan engine", "scope": "eq", "trust": 1.8, "vendor": "mcafee", "version": "5.400.0.1158" }, { "model": "panda antivirus", "scope": "eq", "trust": 1.6, "vendor": "pandasecurity", "version": "10.0.2.7" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "quick heal", "scope": "eq", "trust": 1.0, "vendor": "cat", "version": "11.00" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "endpoint protection", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "antivirus \\\u0026 antispyware", "scope": "eq", "trust": 1.0, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "norman", "version": "6.06.12" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "panda security", "version": "10.0.2.7" }, { "model": "heal", "scope": "eq", "trust": 0.8, "vendor": "quick heal k k", "version": "11.00" }, { "model": "endpoint protection", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20101.3103" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "cat-quickheal", "scope": "eq", "trust": 0.3, "vendor": "quick heal", "version": "11.00" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "pctools", "version": "7.0.35" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "panda", "version": "10.0.27" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "norman", "version": "6.6.12" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "7.0125" }, { "model": "associates etrust vet antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "36.1.8511" }, { "model": "antiy-avl", "scope": "eq", "trust": 0.3, "vendor": "antiy", "version": "2.0.37" } ], "sources": [ { "db": "BID", "id": "52600" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "NVD", "id": "CVE-2012-1446" }, { "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_vet_antivirus:36.1.8511:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1446" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52600" } ], "trust": 0.3 }, "cve": "CVE-2012-1446", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1446", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54727", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1446", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-410", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54727", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54727" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "NVD", "id": "CVE-2012-1446" }, { "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Norman Antivirus 6.06.12, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, McAfee Gateway (formerly Webwasher) 2010.1C, Sophos Anti-Virus 4.61.0, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified encoding field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.Changed by a third party encoding With field ELF Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, eSafe 7.0.17.0, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, \n Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1430\n13. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1446" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "BID", "id": "52600" }, { "db": "VULHUB", "id": "VHN-54727" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1446", "trust": 2.9 }, { "db": "BID", "id": "52600", "trust": 1.4 }, { "db": "OSVDB", "id": "80431", "trust": 1.1 }, { "db": "OSVDB", "id": "80426", "trust": 1.1 }, { "db": "OSVDB", "id": "80427", "trust": 1.1 }, { "db": "OSVDB", "id": "80428", "trust": 1.1 }, { "db": "OSVDB", "id": "80430", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-001897", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-410", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-54727", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54727" }, { "db": "BID", "id": "52600" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1446" }, { "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "id": "VAR-201203-0370", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54727" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AVL SDK", "trust": 0.8, "url": "http://www.antiy.net/en/avlsdk.html" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.vet.com.au/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.fortinet.com/" }, { "title": "MacAfee Scan Engine", "trust": 0.8, "url": "http://www.mcafee.com/us/support/support-eol-scan-engine.aspx" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.norman.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.ps-japan.co.jp/" }, { "title": "PC Tools AntiVirus", "trust": 0.8, "url": "http://www.pctools.com/jp/spyware-doctor-antivirus/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.quickheal.com/" }, { "title": "Endpoint Protection", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/endpoint-protection" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" }, { "title": "Kaspersky Anti-Virus", "trust": 0.8, "url": "http://www.kaspersky.com/kaspersky_anti-virus" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com" }, { "title": "McAfee Web Gateway", "trust": 0.8, "url": "http://www.mcafee.com/japan/products/web_gateway.asp" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001897" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54727" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "NVD", "id": "CVE-2012-1446" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/52600" }, { "trust": 1.1, "url": "http://osvdb.org/80426" }, { "trust": 1.1, "url": "http://osvdb.org/80427" }, { "trust": 1.1, "url": "http://osvdb.org/80428" }, { "trust": 1.1, "url": "http://osvdb.org/80430" }, { "trust": 1.1, "url": "http://osvdb.org/80431" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1446" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1446" }, { "trust": 0.3, "url": "http://www.antiy.net" }, { "trust": 0.3, "url": "http://www.ca.com" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://anti-virus-software-review.toptenreviews.com/norman-review.html" }, { "trust": 0.3, "url": "http://www.pandasecurity.com/usa/" }, { "trust": 0.3, "url": "http://www.pctools.com/spyware-doctor-antivirus/" }, { "trust": 0.3, "url": "http://www.quickheal.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54727" }, { "db": "BID", "id": "52600" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1446" }, { "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54727" }, { "db": "BID", "id": "52600" }, { "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1446" }, { "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54727" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52600" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-21T10:11:48.270000", "db": "NVD", "id": "CVE-2012-1446" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-28T00:00:00", "db": "VULHUB", "id": "VHN-54727" }, { "date": "2012-03-30T16:10:00", "db": "BID", "id": "52600" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001897" }, { "date": "2012-07-28T03:30:35.210000", "db": "NVD", "id": "CVE-2012-1446" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-410" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-410" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products ELF Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001897" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-410" } ], "trust": 0.6 } }
var-201203-0391
Vulnerability from variot
The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.A specific position by a third party \4a\46\49\46 With the character sequence ELF Malware detection may be avoided via files. Successful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All affected products are command-line versions of the AVs.
Vulnerability Descriptions
- Specially crafted infected POSIX TAR files with "[aliases]" as first 9 bytes evades detection.
Affected products - ClamAV 0.96.4, CAT-QuickHeal 11.00
CVE no - CVE-2012-1419
- Specially crafted infected POSIX TAR files with "\7fELF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, Rising 22.83.00.03
CVE no - CVE-2012-1420
- Specially crafted infected POSIX TAR files with "MSCF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, Symantec 20101.3.0.103
CVE no - CVE-2012-1421
- Specially crafted infected POSIX TAR files with "ITSF" as first 4 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1422
- Specially crafted infected POSIX TAR files with "MZ" as first 2 bytes evades detection.
Affected products - Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0
CVE no - CVE-2012-1423
- Specially crafted infected POSIX TAR files with "\19\04\00\10" at offset 8 evades detection.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, PCTools 7.0.3.5, Sophos 4.61.0
CVE no - CVE-2012-1424
- Specially crafted infected POSIX TAR files with "\50\4B\03\04" as the first 4 bytes evades detection.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004
CVE no - CVE-2012-1425
- Specially crafted infected POSIX TAR files with "\42\5A\68" as the first 3 bytes evades detection.
Affected products - CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03
CVE no - CVE-2012-1426
- Specially crafted infected POSIX TAR files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1427
- Specially crafted infected POSIX TAR files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0
CVE no - CVE-2012-1428
- Specially crafted infected ELF files with "ustar" at offset 257 evades detection.
Affected products - BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01
CVE no - CVE-2012-1429 12. Specially crafted infected ELF files with "\19\04\00\10" at offset 8 evades detection. Specially crafted infected ELF files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03
CVE no - CVE-2012-1431
- Specially crafted infected MS EXE files with "\57\69\6E\5A\69\70" at offset 29 evades detection.
Affected products - Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1432
- Specially crafted infected MS EXE files with "\4a\46\49\46" at offset 6 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1433
- Specially crafted infected MS EXE files with "\19\04\00\10" at offset 8 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1434
- Specially crafted infected MS EXE files with "\50\4B\4C\49\54\45" at offset 30 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1435
- Specially crafted infected MS EXE files with "\2D\6C\68" at offset 2 evades detection.
Affected products - AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7
CVE no - CVE-2012-1436
- Specially crafted infected MS Office files with "\50\4B\53\70\58" at offset 526 evades detection.
Affected products - Comodo 7425
CVE no - CVE-2012-1437
- Specially crafted infected MS Office files with "ustar" at offset 257 evades detection.
Affected products - Comodo 7425, Sophos 4.61.0
CVE no - CVE-2012-1438
- 'padding' field in ELF files is parsed incorrectly. If an infected ELF file's padding field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1439
- 'identsize' field in ELF files is parsed incorrectly. If an infected ELF file's identsize field is incremented by 1 it evades detection.
Affected products - Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1440
- 'e_ip' and 'e_res' field in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1 it evades detection.
Affected products - Prevx 3.0
'e_minalloc', 'e_res2','e_cparhdr', 'e_crlc', 'e_lfarlc','e_maxalloc',
'e_oeminfo', 'e_ovno', 'e_cs', 'e_csum','e_sp', 'e_ss', 'e_cblp' and
'e_oemid' fields in MS EXE files are parsed incorrectly.
If any of these fields in an infected MS EXE file is incremented by 1
it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0
CVE no - CVE-2012-1441
- 'class' field in ELF files is parsed incorrectly.
If an infected ELF file's class field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1442
- Infected RAR files with initial two bytes set to 'MZ' can be fixed by the user and correctly extracted. Such a file evades detection.
Affected products - ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0 nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, Avast5 5.0.677.0, VBA32 3.12.14.2
CVE no - CVE-2012-1443
- 'abiversion' field in ELF files is parsed incorrectly.
If an infected ELF file's abiversion field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1444
- 'abi' field in ELF files is parsed incorrectly.
If an infected ELF file's abi field is incremented by 1 it evades detection.
Affected products - eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1445
- 'encoding' field in ELF files is parsed incorrectly.
If an infected ELF file's encoding field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1446
- 'e_version' field in ELF files is parsed incorrectly.
If an infected ELF file's e_version field is incremented by 1 it evades detection.
Affected products - Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7
CVE no - CVE-2012-1447
- 'cbCabinet' field in CAB files is parsed incorrectly.
If an infected CAB file's cbCabinet field is incremented by 1 it evades detection.
Affected products - CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0 TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1
CVE no - CVE-2012-1448
- 'vMajor' field in CAB files is parsed incorrectly.
If an infected CAB file's vMajor field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1449
- 'reserved3' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1450
- 'reserved2' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved2 field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0
CVE no - CVE-2012-1451
- 'reserved1' field in CAB files is parsed incorrectly.
If an infected CAB file's reserved field is incremented by 1 it evades detection.
Affected products - Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00
CVE no - CVE-2012-1452
- 'coffFiles' field in CAB files is parsed incorrectly.
If an infected CAB file's coffFiles field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C, Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402, Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1453
- 'ei_version' field in ELF files is parsed incorrectly.
If an infected ELF file's version field is incremented by 1 it evades detection.
Affected products - McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7
CVE no - CVE-2012-1454
- 'vMinor' field in CAB files is parsed incorrectly.
If an infected CAB file's version field is incremented by 1 it evades detection.
Affected products - NOD32 5795, Rising 22.83.00.03
CVE no - CVE-2012-1455
- A specially crafted ZIP file, created by concatenating the contents of a clean TAR archive and a virus-infected ZIP archive, is parsed incorrectly and evades detection. If the length field in the header of a file with test EICAR virus included into a TAR archive is set to be greater than the archive's total length (1,000,000+original length in our experiments), the antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program.
Affected products - AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0
CVE no - CVE-2012-1457
- A Windows Compiled HTML Help (CHM) file is a set of HTML files, scripts, and images compressed using the LZX algorithm. For faster random accesses, the algorithm is reset at intervals instead of compressing the entire file as a single stream. The length of each interval is specified in the LZXC header.
If an infected CHM file's header modified so that the reset interval is lower than in the original file, the antivirus declares the file to be clean. But the Windows CHM viewer hh.exe correctly decompresses the infected content located before the tampered header.
Affected products - ClamAV 0.96.4, Sophos 4.61.0
CVE no - CVE-2012-1458
- In a POSIX TAR archive, each member file has a 512-byte header protected by a simple checksum. Every header also contains a file length field, which is used by the extractor to locate the next header in the archive.
If a TAR archive contains two files: the first one is clean, while the second is infected with test EICAR virus - and it is modified such that the length field in the header of the first, clean file to point into the middle of the header of the second, infected file. The antivirus declares the file to be clean but virus gets extracted correctly by the GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, the antivirus declares the file to be clean but virus gets extracted by the gunzip+tar programs correctly by ignoring these bytes.
Affected products - Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, VBA32 3.12.14.2
CVE no - CVE-2012-1460
- GZIP files can contain multiple compressed streams, which are assembled when the contents are extracted. If an infected .tar.gz file is broken into two streams, the antivirus declares the infected .tar.gz file to be clean while tar+gunzip extract the virus correctly
Affected products - AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2
CVE no - CVE-2012-1461
- If an infected ZIP archive is prepended with 1024 random bytes at the beginning, the antivirus declares the file to be clean but virus gets extracted by the unzip program correctly by skipping these bytes
Affected products - AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103
CVE no - CVE-2012-1462
- In most ELF files, the 5th byte of the header indicates endianness: 01 for little-endian, 02 for bigendian. Linux kernel, however, does not check this field before loading an ELF file. If an infected ELF file's 5-th byte is set to 02, the antivirus declares the file to be clean but the ELF file gets executed correctly.
Affected products - AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7
CVE no - CVE-2012-1463
Credits
Vulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov.
References
"Abusing File Processing in Malware Detectors for Fun and Profit" by Suman Jana and Vitaly Shmatikov To appear in IEEE Symposium on Security and Privacy 2012 http://www.ieee-security.org/TC/SP2012/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "antivirus", "scope": "eq", "trust": 2.1, "vendor": "comodo", "version": "7424" }, { "model": "command antivirus", "scope": "eq", "trust": 1.8, "vendor": "authentium", "version": "5.2.11.5" }, { "model": "bitdefender", "scope": "eq", "trust": 1.8, "vendor": "bitdefender", "version": "7.2" }, { "model": "esafe", "scope": "eq", "trust": 1.8, "vendor": "aladdin", "version": "7.0.17.0" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.8, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.8, "vendor": "sophos", "version": "4.61.0" }, { "model": "antivirus", "scope": "eq", "trust": 1.6, "vendor": "rising global", "version": "22.83.00.03" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 1.0, "vendor": "f prot", "version": "4.6.2.117" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "2010.1c" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "rising", "version": "22.83.00.03" }, { "model": "f-prot antivirus", "scope": "eq", "trust": 0.8, "vendor": "frisk", "version": "4.6.2.117" }, { "model": "anti-virus", "scope": "eq", "trust": 0.8, "vendor": "nprotect", "version": "2011-01-17.01" }, { "model": "web gateway software", "scope": "eq", "trust": 0.8, "vendor": "mcafee", "version": "2010.1c" }, { "model": "anti-virus", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "4.61" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "rising", "version": "22.8303" }, { "model": "mcafee-gw-edition 2010.1c", "scope": null, "trust": 0.3, "vendor": "mcafee", "version": null }, { "model": "nprotect", "scope": "eq", "trust": 0.3, "vendor": "inca", "version": "2011-01-17.01" }, { "model": "software f-prot antivirus", "scope": "eq", "trust": 0.3, "vendor": "frisk", "version": "4.6.2117" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "9.0.16160.0" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "esafe", "version": "7.0.170" }, { "model": "antivirus", "scope": "eq", "trust": 0.3, "vendor": "bitdefender", "version": "7.2" }, { "model": "command antivirus", "scope": "eq", "trust": 0.3, "vendor": "authentium", "version": "5.2.115" } ], "sources": [ { "db": "BID", "id": "52591" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "NVD", "id": "CVE-2012-1431" }, { "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1431" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Suman Jana and Vitaly Shmatikov", "sources": [ { "db": "BID", "id": "52591" } ], "trust": 0.3 }, "cve": "CVE-2012-1431", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1431", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-54712", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1431", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201203-396", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-54712", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-54712" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "NVD", "id": "CVE-2012-1431" }, { "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\4a\\46\\49\\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. Multiple products ELF A file parser contains a vulnerability that can prevent malware detection. Different ELF If it is announced that there is also a problem with the parser implementation, this vulnerability can be CVE May be split.A specific position by a third party \\4a\\46\\49\\46 With the character sequence ELF Malware detection may be avoided via files. \nSuccessful exploits will allow attackers to bypass on-demand virus scanning, possibly allowing malicious files to escape detection. Multiple file-parsing vulnerabilities leading to evasion in different antivirus(AV) products. All \naffected products are command-line versions of \nthe AVs. \n\n----------------------------\nVulnerability Descriptions\n----------------------------\n\n1. Specially crafted infected POSIX TAR files with \"[aliases]\" as first 9 bytes \n evades detection. \n\n Affected products -\n ClamAV 0.96.4, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1419\n\n2. Specially crafted infected POSIX TAR files with \"\\7fELF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n Fortinent 4.2.254.0, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, Panda 10.0.2.7, \n Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1420\n\n3. Specially crafted infected POSIX TAR files with \"MSCF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Rising 22.83.00.03, \n Symantec 20101.3.0.103\n\n CVE no - \n CVE-2012-1421\n\n4. Specially crafted infected POSIX TAR files with \"ITSF\" as first 4 bytes \n evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, NOD32 5795, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1422\n\n5. Specially crafted infected POSIX TAR files with \"MZ\" as first 2 bytes \n evades detection. \n\n Affected products -\n Command 5.2.11.5, Emsisoft 5.1.0.1, F-Prot 4.6.2.117, Fortinent 4.2.254.0, \n Ikarus T3.1.1.97.0, K7AntiVirus 9.77.3565, NOD32 5795, Norman 6.06.12, \n PCTools 7.0.3.5, Rising 22.83.00.03, VirusBuster 13.6.151.0\n\n CVE no - \n CVE-2012-1423\n\n6. Specially crafted infected POSIX TAR files with \"\\19\\04\\00\\10\" at offset 8\n evades detection. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Jiangmin 13.0.900, Norman 6.06.12, \n PCTools 7.0.3.5, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1424\n\n\n7. Specially crafted infected POSIX TAR files with \"\\50\\4B\\03\\04\" as the first\n 4 bytes evades detection. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Emsisoft 5.1.0.1,\n Fortinet 4.2.254.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004 \n\n CVE no - \n CVE-2012-1425\n\n8. Specially crafted infected POSIX TAR files with \"\\42\\5A\\68\" as the first\n 3 bytes evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Command 5.2.11.5, F-Prot 4.6.2.117, \n K7AntiVirus 9.77.3565, Norman 6.06.12, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1426\n\n\n9. Specially crafted infected POSIX TAR files with \"\\57\\69\\6E\\5A\\69\\70\" at \n offset 29 evades detection. \n\n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1427\n\n10. Specially crafted infected POSIX TAR files with \"\\4a\\46\\49\\46\" at offset 6\n evades detection. \n \n Affected products -\n CAT-QuickHeal 11.00, Norman 6.06.12, Sophos 4.61.0\n\n CVE no - \n CVE-2012-1428\n\n11. Specially crafted infected ELF files with \"ustar\" at offset 257\n evades detection. \n\n Affected products -\n BitDefender 7.2, Comodo 7424, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, McAfee 5.400.0.1158, \n McAfee-GW-Edition 2010.1C, nProtect 2011-01-17.01 \n\n CVE no - \n CVE-2012-1429\n12. Specially crafted infected ELF files with \"\\19\\04\\00\\10\" at offset 8 evades\n detection. Specially crafted infected ELF files with \"\\4a\\46\\49\\46\" at offset 6 evades\n detection. \n\n Affected products -\n BitDefender 7.2, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, \n F-Prot 4.6.2.117, F-Secure 9.0.16160.0, McAfee-GW-Edition 2010.1C, \n nProtect 2011-01-17.01, Sophos 4.61.0, Rising 22.83.00.03\n\n CVE no - \n CVE-2012-1431\n\n14. Specially crafted infected MS EXE files with \"\\57\\69\\6E\\5A\\69\\70\" at offset\n 29 evades detection. \n\n Affected products -\n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1432\n\n15. Specially crafted infected MS EXE files with \"\\4a\\46\\49\\46\" at offset\n 6 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1433\n\n16. Specially crafted infected MS EXE files with \"\\19\\04\\00\\10\" at offset\n 8 evades detection. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, \n Panda 10.0.2.7\n \n CVE no - \n CVE-2012-1434\n\n17. Specially crafted infected MS EXE files with \"\\50\\4B\\4C\\49\\54\\45\" at \n offset 30 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1435\n\n18. Specially crafted infected MS EXE files with \"\\2D\\6C\\68\" at \n offset 2 evades detection. \n \n Affected products - \n AhnLab-V3 2011.01.18.00, Emsisoft 5.1.0.1, eSafe 7.0.17.0, \n Ikarus T3.1.1.97.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1436\n\n19. Specially crafted infected MS Office files with \"\\50\\4B\\53\\70\\58\" at \n offset 526 evades detection. \n \n Affected products - \n Comodo 7425\n \n CVE no - \n CVE-2012-1437\n\n20. Specially crafted infected MS Office files with \"ustar\" at \n offset 257 evades detection. \n\n Affected products - \n Comodo 7425, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1438\n\n21. \u0027padding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s padding field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.17.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1439\n\n22. \u0027identsize\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s identsize field is incremented by 1 it evades\n detection. \n\n Affected products - \n Norman 6.06.12, eSafe 7.0.17.0, eTrust-Vet 36.1.8511, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1440\n\n23. \u0027e_ip\u0027 and \u0027e_res\u0027 field in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n Prevx 3.0\n\n \u0027e_minalloc\u0027, \u0027e_res2\u0027,\u0027e_cparhdr\u0027, \u0027e_crlc\u0027, \u0027e_lfarlc\u0027,\u0027e_maxalloc\u0027,\n \u0027e_oeminfo\u0027, \u0027e_ovno\u0027, \u0027e_cs\u0027, \u0027e_csum\u0027,\u0027e_sp\u0027, \u0027e_ss\u0027, \u0027e_cblp\u0027 and \n \u0027e_oemid\u0027 fields in MS EXE files are parsed incorrectly. \n If any of these fields in an infected MS EXE file is incremented by 1 \n it evades detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0\n\n\n CVE no - \n CVE-2012-1441\n\n24. \u0027class\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s class field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n eSafe 7.0.017.0, Kaspersky 7.0.0.125, F-Secure 9.0.16160.0, \n Sophos 4.61.0, Antiy-AVL 2.0.3.7, Rising 22.83.00.03, Fortinet 4.2.254.0, \n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1442\n\n25. Infected RAR files with initial two bytes set to \u0027MZ\u0027 can be fixed by the \n user and correctly extracted. Such a file evades detection. \n \n Affected products -\n ClamAV 0.96.4, Rising 22.83.00.03, CAT-QuickHeal 11.00, GData 21, \n Symantec 20101.3.0.103, Command 5.2.11.5, Ikarus T3.1.1.97.0, \n Emsisoft 5.1.0.1, PCTools 7.0.3.5, F-Prot 4.6.2.117, \n VirusBuster 13.6.151.0, Fortinent 4.2.254.0, Antiy-AVL 2.0.3.7, \n K7AntiVirus 9.77.3565, TrendMicro-HouseCall 9.120.0.1004,Kaspersky 7.0.0.125 \n Jiangmin 13.0.900. Microsoft 1.6402, Sophos 4.61.0, NOD32 5795, AntiVir 7.11.1.163, \n Norman 6.06.12, McAfee 5.400.0.1158, Panda 10.0.2.7, McAfee-GW-Edition 2010.1C, \n TrendMicro 9.120.0.1004, Comodo 7424, BitDefender 7.2, eSafe 7.0.17.0, F-Secure 9.0.16160.0\n nProtect 2011-01-17.01, AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, Avast 4.8.1351.0, \n Avast5 5.0.677.0, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1443\n\n26. \u0027abiversion\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abiversion field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Prevx 3.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1444\n\n27. \u0027abi\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s abi field is incremented by 1 it evades\n detection. \n\n Affected products - \n eSafe 7.0.017.0, Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1445\n\n28. \u0027encoding\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s encoding field is incremented by 1 it evades\n detection. \n\n Affected products - \n CAT-QuickHeal 11.00, McAfee 5.400.0.1158, Symantec 20101.3.0.103, \n Norman 6.06.12, eSafe 7.0.017.0, Kaspersky 7.0.0.125, \n McAfee-GW-Edition 2010.1C, Sophos 4.61.0, eTrust-Vet 36.1.8511, \n Antiy-AVL 2.0.3.7, PCTools 7.0.3.5, Rising 22.83.00.03, Fortinet 4.2.254.0,\n Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1446\n\n29. \u0027e_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s e_version field is incremented by 1 it evades\n detection. \n\n Affected products -\n Fortinet 4.2.254.0, eSafe 7.0.017.0, DrWeb 5.0.2.03300, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1447\n\n30. \u0027cbCabinet\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s cbCabinet field is incremented by 1 it evades\n detection. \n\n Affected products -\n CAT-QuickHeal 11.00, TrendMicro 9.120.0.1004, Ikarus T3.1.1.97.0\n TrendMicro-HouseCall 9.120.0.1004, Emsisoft 5.1.0.1 \n\n CVE no - \n CVE-2012-1448\n\n31. \u0027vMajor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s vMajor field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1449\n\n32. \u0027reserved3\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Sophos 4.61.0, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1450\n\n33. \u0027reserved2\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved2 field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0\n \n CVE no - \n CVE-2012-1451\n\n34. \u0027reserved1\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s reserved field is incremented by 1 it evades\n detection. \n\n Affected products -\n Emsisoft 5.1.0.1, Ikarus T3.1.1.97.0, CAT-QuickHeal 11.00\n \n CVE no - \n CVE-2012-1452\n\n35. \u0027coffFiles\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s coffFiles field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.2.03300, TrendMicro-HouseCall 9.120.0.1004, Kaspersky 7.0.0.125, \n Sophos 4.61.0, TrendMicro 9.120.0.1004, McAfee-GW-Edition 2010.1C,\n Emsisoft 5.1.0.1, eTrust-Vet 36.1.8511, Antiy-AVL 2.0.3.7, Microsoft 1.6402,\n Rising 22.83.00.03, Ikarus T3.1.1.97.0, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1453\n\n36. \u0027ei_version\u0027 field in ELF files is parsed incorrectly. \n If an infected ELF file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n McAfee 5.0.02.03300, eSafe 7.0.17.0, McAfee-GW-Edition 2010.1C, \n Rising 22.83.00.03, Fortinet 4.2.254.0, Panda 10.0.2.7\n\n CVE no - \n CVE-2012-1454\n\n37. \u0027vMinor\u0027 field in CAB files is parsed incorrectly. \n If an infected CAB file\u0027s version field is incremented by 1 it evades\n detection. \n\n Affected products -\n NOD32 5795, Rising 22.83.00.03\n \n CVE no - \n CVE-2012-1455\n\n38. A specially crafted ZIP file, created by concatenating the contents \n of a clean TAR archive and a virus-infected ZIP archive, is parsed \n incorrectly and evades detection. If the length field in the header of a file with test EICAR virus\n included into a TAR archive is set to be greater than the archive\u0027s total \n length (1,000,000+original length in our experiments), the antivirus \n declares the file to be clean but virus gets extracted correctly by the \n GNU tar program. \n\n Affected products -\n AntiVir 7.11.1.163, Antiy-AVL 2.0.3.7, Avast 4.8.1351.0, Avast5 5.0.677.0, \n AVG 10.0.0.1190, BitDefender 7.2, CAT-QuickHeal 11.00, ClamAV 0.96.4, \n Command 5.2.11.5, Emsisoft 5.1.0.1, eSafe 7.0.17.0, F-Prot 4.6.2.117, \n GData 21, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, K7AntiVirus 9.77.3565, \n Kaspersky 7.0.0.125, McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, \n Microsoft 1.6402, NOD32 5795, Norman 6.06.12, PCTools 7.0.3.5, \n Rising 22.83.00.03, Symantec 20101.3.0.103, TrendMicro 9.120.0.1004, \n TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2, VirusBuster 13.6.151.0 \n\n CVE no - \n CVE-2012-1457\n\n40. A Windows Compiled HTML Help (CHM) file is a set of HTML files,\n scripts, and images compressed using the LZX algorithm. \n For faster random accesses, the algorithm is reset at intervals\n instead of compressing the entire file as a single stream. The\n length of each interval is specified in the LZXC header. \n\n If an infected CHM file\u0027s header modified so that the reset interval\n is lower than in the original file, the antivirus declares the file\n to be clean. But the Windows CHM viewer hh.exe correctly decompresses\n the infected content located before the tampered header. \n\n Affected products -\n ClamAV 0.96.4, Sophos 4.61.0 \n\n CVE no - \n CVE-2012-1458\n\n41. In a POSIX TAR archive, each member file has a 512-byte header protected\n by a simple checksum. Every header also contains a file length field, which\n is used by the extractor to locate the next header in the archive. \n\n If a TAR archive contains two files: the first one is clean, while\n the second is infected with test EICAR virus - and it is modified such that \n the length field in the header of the first, clean file to point into the \n middle of the header of the second, infected file. The antivirus declares \n the file to be clean but virus gets extracted correctly by the \n GNU tar program. If an infected tar.gz archive is appended 6 random bytes at the end, \n the antivirus declares the file to be clean but virus gets extracted by\n the gunzip+tar programs correctly by ignoring these bytes. \n\n Affected products -\n Antiy-AVL 2.0.3.7, CAT-QuickHeal 11.00, Command 5.2.11.5, \n eSafe 7.0.17.0, F-Prot 4.6.2.117, Jiangmin 13.0.900, \n K7AntiVirus 9.77.3565, VBA32 3.12.14.2 \n \n CVE no - \n CVE-2012-1460\n\n43. GZIP files can contain multiple compressed streams, which are assembled\n when the contents are extracted. If an infected .tar.gz file is broken \n into two streams, the antivirus declares the infected .tar.gz file to \n be clean while tar+gunzip extract the virus correctly\n\n Affected products -\n AVG 10.0.0.1190, BitDefender 7.2, Command 5.2.11.5, Emsisoft 5.1.0.1, \n F-Secure 9.0.16160.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, K7AntiVirus 9.77.3565, Kaspersky 7.0.0.125, \n McAfee 5.400.0.1158, McAfee-GW-Edition 2010.1C, NOD32 5795, Norman 6.06.12, \n Rising 22.83.00.03, Sophos 4.61.0, Symantec 20101.3.0.103, \n TrendMicro 9.120.0.1004, TrendMicro-HouseCall 9.120.0.1004, VBA32 3.12.14.2 \n\n CVE no - \n CVE-2012-1461\n\n44. If an infected ZIP archive is prepended with 1024 random bytes at the \n beginning, the antivirus declares the file to be clean but virus gets extracted\n by the unzip program correctly by skipping these bytes\n\n Affected products -\n AhnLab-V3 2011.01.18.00, AVG 10.0.0.1190, CAT-QuickHeal 11.00, \n Emsisoft 5.1.0.1, eSafe 7.0.17.0, Fortinent 4.2.254.0, Ikarus T3.1.1.97.0, \n Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, \n Symantec 20101.3.0.103 \n\n CVE no - \n CVE-2012-1462\n\n45. In most ELF files, the 5th byte of the header indicates endianness: 01\n for little-endian, 02 for bigendian. Linux kernel, however, does not\n check this field before loading an ELF file. If an infected ELF file\u0027s 5-th \n byte is set to 02, the antivirus declares the file to be clean but the ELF \n file gets executed correctly. \n\n Affected products -\n AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, \n Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, \n McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, Panda 10.0.2.7 \n\n CVE no - \n CVE-2012-1463\n\n--------\nCredits\n--------\nVulnerabilities found and advisory written by Suman Jana and Vitaly Shmatikov. \n\n-----------\nReferences\n-----------\n\"Abusing File Processing in Malware Detectors for Fun and Profit\" by Suman Jana and Vitaly Shmatikov\nTo appear in IEEE Symposium on Security and Privacy 2012\nhttp://www.ieee-security.org/TC/SP2012/ \n", "sources": [ { "db": "NVD", "id": "CVE-2012-1431" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "BID", "id": "52591" }, { "db": "VULHUB", "id": "VHN-54712" }, { "db": "PACKETSTORM", "id": "110990" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1431", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2012-001893", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-396", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20120319 EVASION ATTACKS EXPOLITING FILE-PARSING VULNERABILITIES IN ANTIVIRUS PRODUCTS", "trust": 0.6 }, { "db": "BID", "id": "52591", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-54712", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54712" }, { "db": "BID", "id": "52591" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1431" }, { "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "id": "VAR-201203-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-54712" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:10:08.119000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.authentium.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.rising-global.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bitdefender.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.comodo.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-secure.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.f-prot.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.mcafee.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.nprotect.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sophos.com/" }, { "title": "eSafe", "trust": 0.8, "url": "http://www.aladdin.co.jp/esafe/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001893" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-54712" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "NVD", "id": "CVE-2012-1431" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/522005" }, { "trust": 1.7, "url": "http://www.ieee-security.org/tc/sp2012/program.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1431" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1431" }, { "trust": 0.3, "url": "http://www.authentium.com" }, { "trust": 0.3, "url": "http://www.bitdefender.com" }, { "trust": 0.3, "url": "http://www.comodo.com/" }, { "trust": 0.3, "url": "http://www.safenet-inc.com/data-protection/content-security-esafe/" }, { "trust": 0.3, "url": "http://www.f-secure.com/" }, { "trust": 0.3, "url": "http://www.f-prot.com/" }, { "trust": 0.3, "url": "http://global.nprotect.com/index.php" }, { "trust": 0.3, "url": "http://www.mcafee.com/" }, { "trust": 0.3, "url": "http://www.rising-global.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "/archive/1/522005" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1429" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1440" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1432" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1438" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1428" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1446" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1441" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1434" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1424" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1423" }, { "trust": 0.1, "url": "http://www.ieee-security.org/tc/sp2012/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1442" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1433" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1437" } ], "sources": [ { "db": "VULHUB", "id": "VHN-54712" }, { "db": "BID", "id": "52591" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1431" }, { "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-54712" }, { "db": "BID", "id": "52591" }, { "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "db": "PACKETSTORM", "id": "110990" }, { "db": "NVD", "id": "CVE-2012-1431" }, { "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-21T00:00:00", "db": "VULHUB", "id": "VHN-54712" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52591" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "date": "2012-03-19T23:51:01", "db": "PACKETSTORM", "id": "110990" }, { "date": "2012-03-21T10:11:47.630000", "db": "NVD", "id": "CVE-2012-1431" }, { "date": "2012-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-27T00:00:00", "db": "VULHUB", "id": "VHN-54712" }, { "date": "2012-03-20T00:00:00", "db": "BID", "id": "52591" }, { "date": "2012-03-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001893" }, { "date": "2012-03-27T04:00:00", "db": "NVD", "id": "CVE-2012-1431" }, { "date": "2012-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple products ELF Vulnerability that prevents file parsers from detecting malware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-396" } ], "trust": 0.6 } }
var-200501-0243
Vulnerability from variot
Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Archive::Zip does not properly parse Zip files and may incorrectly interpret malformed zip archives to contain zero length/size files. As a a result, anti-virus software using Archive::Zip may fail to detect malicious content within a Zip archive. Archive::Zip is a free perl module for working with zip compressed files. Archive::Zip versions prior to 1.14 have security bypass vulnerabilities when used in antivirus programs
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0243", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "suse", "version": "9.2" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.84" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "4.6" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.86" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "4.3.20" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "1.4" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.80" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.81" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.85" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.83" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.4.6" }, { "model": "small business suite", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "1.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.82" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cpan", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#492545" }, { "db": "NVD", "id": "CVE-2004-1096" }, { "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1096" } ] }, "cve": "CVE-2004-1096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9526", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-1096", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#492545", "trust": 0.8, "value": "3.59" }, { "author": "CNNVD", "id": "CNNVD-200501-061", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9526", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#492545" }, { "db": "VULHUB", "id": "VHN-9526" }, { "db": "NVD", "id": "CVE-2004-1096" }, { "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Archive::Zip does not properly parse Zip files and may incorrectly interpret malformed zip archives to contain zero length/size files. As a a result, anti-virus software using Archive::Zip may fail to detect malicious content within a Zip archive. Archive::Zip is a free perl module for working with zip compressed files. Archive::Zip versions prior to 1.14 have security bypass vulnerabilities when used in antivirus programs", "sources": [ { "db": "NVD", "id": "CVE-2004-1096" }, { "db": "CERT/CC", "id": "VU#492545" }, { "db": "VULHUB", "id": "VHN-9526" } ], "trust": 1.71 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9526", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9526" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#492545", "trust": 2.5 }, { "db": "SECUNIA", "id": "13038", "trust": 1.7 }, { "db": "BID", "id": "11448", "trust": 1.7 }, { "db": "NVD", "id": "CVE-2004-1096", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200501-061", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9526", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#492545" }, { "db": "VULHUB", "id": "VHN-9526" }, { "db": "NVD", "id": "CVE-2004-1096" }, { "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "id": "VAR-200501-0243", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9526" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:29.045000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Archive::Zip AntiVirus Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146865" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/492545" }, { "trust": 1.7, "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:118" }, { "trust": 1.7, "url": "http://secunia.com/advisories/13038/" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html" }, { "trust": 0.8, "url": "http://rt.cpan.org/noauth/bug.html?id=8077" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=153" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "CERT/CC", "id": "VU#492545" }, { "db": "VULHUB", "id": "VHN-9526" }, { "db": "NVD", "id": "CVE-2004-1096" }, { "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#492545" }, { "db": "VULHUB", "id": "VHN-9526" }, { "db": "NVD", "id": "CVE-2004-1096" }, { "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-11-12T00:00:00", "db": "CERT/CC", "id": "VU#492545" }, { "date": "2005-01-10T00:00:00", "db": "VULHUB", "id": "VHN-9526" }, { "date": "2005-01-10T05:00:00", "db": "NVD", "id": "CVE-2004-1096" }, { "date": "2005-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-11-15T00:00:00", "db": "CERT/CC", "id": "VU#492545" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9526" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-1096" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-061" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Archive::Zip may not properly parse the file sizes of Zip archives", "sources": [ { "db": "CERT/CC", "id": "VU#492545" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-061" } ], "trust": 0.6 } }
var-200501-0311
Vulnerability from variot
Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. This issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. Latest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Eset Anti-Virus is an anti-virus software
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0311", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "small business suite", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "1.0" }, { "model": "puremessage anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "4.6" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.86" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.85" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.84" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.83" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.82" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.81" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.80" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.79" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.78" }, { "model": "anti-virus", "scope": "eq", "trust": 1.3, "vendor": "sophos", "version": "3.4.6" }, { "model": "antivirus engine", "scope": "eq", "trust": 1.3, "vendor": "mcafee", "version": "4.3.20" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "gentoo", "version": "1.4" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.1" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.12" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.0" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.0" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.13" }, { "model": "etrust secure content manager", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "1.0" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.5" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "ca", "version": "7.0_sp2" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 1.0, "vendor": "eset", "version": "1.0.11" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.1.13" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "for mail servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.4.2" }, { "model": "etrust intrusion detection", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "1.4.5" }, { "model": "inoculateit", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.0" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "4.0" }, { "model": "brightstor arcserve backup", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "11.1" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "5.0" }, { "model": "for file servers", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.4" }, { "model": "desktop", "scope": "eq", "trust": 1.0, "vendor": "rav antivirus", "version": "8.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "kaspersky lab", "version": "3.0" }, { "model": "etrust antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.1" }, { "model": "etrust antivirus gateway", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "7.0" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.2" }, { "model": "etrust ez antivirus", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "6.1" }, { "model": "etrust ez armor", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2.3" }, { "model": "anti-virus", "scope": "eq", "trust": 1.0, "vendor": "sophos", "version": "3.78d" }, { "model": "archive zip", "scope": "eq", "trust": 1.0, "vendor": "archive zip", "version": "1.13" }, { "model": "inoculateit", "scope": "eq", "trust": 0.6, "vendor": "ca", "version": "6.0" }, { "model": "anti-virus d", "scope": "eq", "trust": 0.3, "vendor": "sophos", "version": "3.78" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "antivirus rav antivirus for mail servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.4.2" }, { "model": "antivirus rav antivirus for file servers", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "1.0" }, { "model": "antivirus rav antivirus desktop", "scope": "eq", "trust": 0.3, "vendor": "rav", "version": "8.6" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "5.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "4.0" }, { "model": "labs antivirus scanning engine", "scope": "eq", "trust": 0.3, "vendor": "kaspersky", "version": "3.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.013" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.012" }, { "model": "nod32 antivirus", "scope": "eq", "trust": 0.3, "vendor": "eset", "version": "1.011" }, { "model": "associates inoculateit", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.1" }, { "model": "associates etrust secure content manager sp1", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust secure content manager", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.0" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.5" }, { "model": "associates etrust intrusion detection", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "1.4.1.13" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.4" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.3" }, { "model": "associates etrust ez armor", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "2.0" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.3" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.2" }, { "model": "associates etrust ez antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "6.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus for the gateway", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.1" }, { "model": "associates etrust antivirus sp2", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates etrust antivirus", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "7.0" }, { "model": "associates brightstor arcserve backup for windows", "scope": "eq", "trust": 0.3, "vendor": "computer", "version": "11.1" }, { "model": "archive::zip", "scope": "eq", "trust": 0.3, "vendor": "archive zip", "version": "1.13" }, { "model": "archive::zip", "scope": "ne", "trust": 0.3, "vendor": "archive zip", "version": "1.14" } ], "sources": [ { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0935" }, { "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.78d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_antivirus:7.0_sp2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_desktop:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_file_servers:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:archive_zip:archive_zip:1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_antivirus:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_secure_content_manager:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ca:etrust_secure_content_manager:1.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:antivirus_engine:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_puremessage_anti-virus:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_small_business_suite:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_antivirus_gateway:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_ez_armor:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:broadcom:etrust_intrusion_detection:1.4.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:eset_software:nod32_antivirus:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:rav_antivirus:rav_antivirus_for_mail_servers:8.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sophos:sophos_anti-virus:3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0935" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Security Advisory\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-297" } ], "trust": 0.6 }, "cve": "CVE-2004-0935", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-9365", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0935", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#968818", "trust": 0.8, "value": "7.59" }, { "author": "CNNVD", "id": "CNNVD-200501-297", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-9365", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9365" }, { "db": "NVD", "id": "CVE-2004-0935" }, { "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eset Anti-Virus before 1.020 (16th September 2004) allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Anti-virus software may rely on corrupted headers to determine if a zip archive is valid. As a result, anti-virus software may fail to detect malicious content within a zip archive. Multiple Vendor Antivirus applications are reported vulnerable to a zip file detection evasion vulnerability. This vulnerability may allow maliciously crafted zip files to avoid being scanned and detected. The malicious archive can bypass the protection provided by a vulnerable antivirus program, giving users a false sense of security. If the user opens and executes the file, this attack can result in a malicious code infection. \nThis issue is reported to affected products offered by McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV. \nLatest antivirus products by Symantec, Bitdefender, Trend Micro and Panda are not vulnerable to this issue. Eset Anti-Virus is an anti-virus software", "sources": [ { "db": "NVD", "id": "CVE-2004-0935" }, { "db": "CERT/CC", "id": "VU#968818" }, { "db": "BID", "id": "11448" }, { "db": "VULHUB", "id": "VHN-9365" } ], "trust": 1.98 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-9365", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9365" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#968818", "trust": 2.5 }, { "db": "BID", "id": "11448", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-0935", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-200501-297", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "629", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-9365", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9365" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0935" }, { "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "id": "VAR-200501-0311", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9365" } ], "trust": 0.725 }, "last_update_date": "2023-12-18T12:40:29.100000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Eset AntiVirus zip Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146863" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0935" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/11448" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/968818" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=153\u0026type=vulnerabilities\u0026flashstatus=true" }, { "trust": 0.8, "url": "http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html" }, { "trust": 0.8, "url": "http://rt.cpan.org/noauth/bug.html?id=8077" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=153" }, { "trust": 0.3, "url": "http://download.mcafee.com/uk/updates/updates.asp" }, { "trust": 0.3, "url": "http://www.nod32.com/" }, { "trust": 0.3, "url": "http://www.kaspersky.com/" }, { "trust": 0.3, "url": "http://www.ravantivirus.com/" }, { "trust": 0.3, "url": "http://www.sophos.com/" }, { "trust": 0.3, "url": "http://supportconnectw.ca.com/public/ca_common_docs/arclib_vuln.asp" }, { "trust": 0.3, "url": "/archive/1/378660" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=153\u0026amp;type=vulnerabilities\u0026amp;flashstatus=true" } ], "sources": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9365" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0935" }, { "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#968818" }, { "db": "VULHUB", "id": "VHN-9365" }, { "db": "BID", "id": "11448" }, { "db": "NVD", "id": "CVE-2004-0935" }, { "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-10T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2005-01-27T00:00:00", "db": "VULHUB", "id": "VHN-9365" }, { "date": "2004-10-18T00:00:00", "db": "BID", "id": "11448" }, { "date": "2005-01-27T05:00:00", "db": "NVD", "id": "CVE-2004-0935" }, { "date": "2004-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-01-14T00:00:00", "db": "CERT/CC", "id": "VU#968818" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9365" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11448" }, { "date": "2021-04-09T17:00:09.303000", "db": "NVD", "id": "CVE-2004-0935" }, { "date": "2021-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200501-297" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-297" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Anti-virus software may not properly scan malformed zip archives", "sources": [ { "db": "CERT/CC", "id": "VU#968818" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200501-297" } ], "trust": 0.6 } }
cve-2010-2308
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/40085 | third-party-advisory, x_refsource_SECUNIA | |
http://dvlabs.tippingpoint.com/advisory/TPTI-10-03 | x_refsource_MISC | |
http://www.sophos.com/support/knowledgebase/article/111126.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/511773/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1024089 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2010/1412 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:32:15.516Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40085", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40085" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/111126.html" }, { "name": "20100609 TPTI-10-03: Sophos Anti-Virus SAVOnAccessFilter Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511773/100/0/threaded" }, { "name": "1024089", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024089" }, { "name": "ADV-2010-1412", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1412" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the filter driver (savonaccessfilter.sys) in Sophos Anti-Virus before 7.6.20 allows local users to gain privileges via crafted arguments to the NtQueryAttributesFile function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "40085", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40085" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/111126.html" }, { "name": "20100609 TPTI-10-03: Sophos Anti-Virus SAVOnAccessFilter Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511773/100/0/threaded" }, { "name": "1024089", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024089" }, { "name": "ADV-2010-1412", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1412" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the filter driver (savonaccessfilter.sys) in Sophos Anti-Virus before 7.6.20 allows local users to gain privileges via crafted arguments to the NtQueryAttributesFile function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40085", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40085" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-03" }, { "name": "http://www.sophos.com/support/knowledgebase/article/111126.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/111126.html" }, { "name": "20100609 TPTI-10-03: Sophos Anti-Virus SAVOnAccessFilter Local Privilege Escalation Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511773/100/0/threaded" }, { "name": "1024089", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024089" }, { "name": "ADV-2010-1412", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1412" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2308", "datePublished": "2010-06-16T20:00:00", "dateReserved": "2010-06-16T00:00:00", "dateUpdated": "2024-08-07T02:32:15.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5647
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.sophos.com/support/knowledgebase/article/7609.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1017132 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/4239 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/20816 | vdb-entry, x_refsource_BID | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451 | third-party-advisory, x_refsource_IDEFENSE | |
http://secunia.com/advisories/22591 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:55:53.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-12-11T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a malformed CHM file with a large name length in the CHM chunk header, aka \"CHM name length memory consumption vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sophos.com/support/knowledgebase/article/7609.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=451" }, { "name": "22591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22591" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5647", "datePublished": "2006-11-01T15:00:00", "dateReserved": "2006-11-01T00:00:00", "dateUpdated": "2024-08-07T19:55:53.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5541
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 | vdb-entry, x_refsource_XF | |
http://securityreason.com/securityalert/4723 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/499043/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/498995/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:56:46.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "multiple-antivirus-mzheader-code-execution(47435)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" }, { "name": "4723", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4723" }, { "name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded" }, { "name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus 4.33.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka \"EXE info\") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "multiple-antivirus-mzheader-code-execution(47435)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" }, { "name": "4723", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4723" }, { "name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded" }, { "name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5541", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus 4.33.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka \"EXE info\") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "multiple-antivirus-mzheader-code-execution(47435)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" }, { "name": "4723", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4723" }, { "name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded" }, { "name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5541", "datePublished": "2008-12-12T18:13:00", "dateReserved": "2008-12-12T00:00:00", "dateUpdated": "2024-08-07T10:56:46.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4577
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2972 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/25428 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26580 | third-party-advisory, x_refsource_SECUNIA | |
http://securityreason.com/securityalert/3073 | third-party-advisory, x_refsource_SREASON | |
http://www.sophos.com/support/knowledgebase/article/28407.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/477727/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php | x_refsource_MISC | |
http://securitytracker.com/id?1018608 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26580" }, { "name": "3073", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3073" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018608" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26580" }, { "name": "3073", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3073" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018608" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (infinite loop) via a malformed BZip file that results in the creation of multiple Engine temporary files (aka a \"BZip bomb\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2972", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "25428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26580" }, { "name": "3073", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3073" }, { "name": "http://www.sophos.com/support/knowledgebase/article/28407.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "20070824 n.runs-SA-2007.026 - Sophos Antivirus BZip parsing Infinite Loop Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477727/100/0/threaded" }, { "name": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_sophos_gzip_infinite_loop_dos.php" }, { "name": "1018608", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018608" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4577", "datePublished": "2007-08-28T18:00:00", "dateReserved": "2007-08-28T00:00:00", "dateUpdated": "2024-08-07T15:01:09.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-6903
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html | x_refsource_MISC | |
http://secunia.com/advisories/33177 | third-party-advisory, x_refsource_SECUNIA | |
http://www.sophos.com/support/knowledgebase/article/50611.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1021476 | vdb-entry, x_refsource_SECTRACK | |
http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=122893252316489&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/3458 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/50863 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/32748 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:49:02.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "name": "33177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "name": "1021476", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "name": "ADV-2008-3458", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3458" }, { "name": "50863", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50863" }, { "name": "32748", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32748" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a \"fuzzed\" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-08-19T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "name": "33177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "name": "1021476", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021476" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "name": "ADV-2008-3458", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3458" }, { "name": "50863", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50863" }, { "name": "32748", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32748" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6903", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a \"fuzzed\" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html", "refsource": "MISC", "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "name": "33177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33177" }, { "name": "http://www.sophos.com/support/knowledgebase/article/50611.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "name": "1021476", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021476" }, { "name": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html", "refsource": "MISC", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "name": "ADV-2008-3458", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3458" }, { "name": "50863", "refsource": "OSVDB", "url": "http://osvdb.org/50863" }, { "name": "32748", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32748" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6903", "datePublished": "2009-08-06T00:00:00", "dateReserved": "2009-08-05T00:00:00", "dateUpdated": "2024-08-07T11:49:02.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5646
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.sophos.com/support/knowledgebase/article/7609.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1017132 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/4239 | vdb-entry, x_refsource_VUPEN | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securityfocus.com/bid/20816 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/22591 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:55:54.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-12-11T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when archive scanning is enabled, allows remote attackers to trigger a denial of service (memory corruption) via a CHM file with an LZX decompression header that specifies a Window_size of 0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sophos.com/support/knowledgebase/article/7609.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20061208 Sophos Antivirus CHM File Heap Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=452" }, { "name": "20816", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20816" }, { "name": "22591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22591" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5646", "datePublished": "2006-11-01T15:00:00", "dateReserved": "2006-11-01T00:00:00", "dateUpdated": "2024-08-07T19:55:54.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2385
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/532558/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Jun/126 | mailing-list, x_refsource_FULLDISC | |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/ | x_refsource_MISC | |
http://www.sophos.com/en-us/support/knowledgebase/121135.aspx | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1030467 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140625 CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532558/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html" }, { "name": "20140625 CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/126" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/en-us/support/knowledgebase/121135.aspx" }, { "name": "1030467", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030467" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter to exclusion/configure or (4) text:EmailServer or (5) newListList:Email parameter to notification/configure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140625 CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532558/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html" }, { "name": "20140625 CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Jun/126" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/en-us/support/knowledgebase/121135.aspx" }, { "name": "1030467", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030467" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter to exclusion/configure or (4) text:EmailServer or (5) newListList:Email parameter to notification/configure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140625 CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532558/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127228/Sophos-Antivirus-9.5.1-Cross-Site-Scripting.html" }, { "name": "20140625 CVE-2014-2385 - Multiple Cross Site Scripting in Sophos Antivirus Configuration Console (Linux)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jun/126" }, { "name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/", "refsource": "MISC", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2385/" }, { "name": "http://www.sophos.com/en-us/support/knowledgebase/121135.aspx", "refsource": "CONFIRM", "url": "http://www.sophos.com/en-us/support/knowledgebase/121135.aspx" }, { "name": "1030467", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030467" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2385", "datePublished": "2014-07-22T14:00:00", "dateReserved": "2014-03-13T00:00:00", "dateUpdated": "2024-08-06T10:14:25.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4512
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/3107 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2007/3077 | vdb-entry, x_refsource_VUPEN | |
http://www.sophos.com/support/knowledgebase/article/29150.html | x_refsource_CONFIRM | |
http://osvdb.org/37527 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/26714 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36478 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/478708/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/25572 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3107", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3107" }, { "name": "ADV-2007-3077", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3077" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/29150.html" }, { "name": "37527", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37527" }, { "name": "26714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26714" }, { "name": "sophos-zip-xss(36478)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36478" }, { "name": "20070906 Sophos Anti-Virus 6.5.4 Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/478708/100/0/threaded" }, { "name": "25572", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25572" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Sophos Anti-Virus for Windows 6.x before 6.5.8 and 7.x before 7.0.1 allows remote attackers to inject arbitrary web script or HTML via an archive with a file that matches a virus signature and has a crafted filename that is not properly handled by the print function in SavMain.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3107", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3107" }, { "name": "ADV-2007-3077", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3077" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/29150.html" }, { "name": "37527", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37527" }, { "name": "26714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26714" }, { "name": "sophos-zip-xss(36478)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36478" }, { "name": "20070906 Sophos Anti-Virus 6.5.4 Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/478708/100/0/threaded" }, { "name": "25572", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25572" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Sophos Anti-Virus for Windows 6.x before 6.5.8 and 7.x before 7.0.1 allows remote attackers to inject arbitrary web script or HTML via an archive with a file that matches a virus signature and has a crafted filename that is not properly handled by the print function in SavMain.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3107", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3107" }, { "name": "ADV-2007-3077", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3077" }, { "name": "http://www.sophos.com/support/knowledgebase/article/29150.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/29150.html" }, { "name": "37527", "refsource": "OSVDB", "url": "http://osvdb.org/37527" }, { "name": "26714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26714" }, { "name": "sophos-zip-xss(36478)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36478" }, { "name": "20070906 Sophos Anti-Virus 6.5.4 Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/478708/100/0/threaded" }, { "name": "25572", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25572" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4512", "datePublished": "2007-09-10T17:00:00", "dateReserved": "2007-08-23T00:00:00", "dateUpdated": "2024-08-07T15:01:09.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1737
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/29996 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/28743 | vdb-entry, x_refsource_BID | |
http://securityreason.com/securityalert/3838 | third-party-advisory, x_refsource_SREASON | |
http://www.vupen.com/english/advisories/2008/1381 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42083 | vdb-entry, x_refsource_XF | |
http://www.coresecurity.com/?action=item&id=2249 | x_refsource_MISC | |
http://www.sophos.com/support/knowledgebase/article/37810.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/491405/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1019945 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:32:01.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29996" }, { "name": "28743", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28743" }, { "name": "3838", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3838" }, { "name": "ADV-2008-1381", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1381" }, { "name": "sophos-ssdt-dos(42083)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42083" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.coresecurity.com/?action=item\u0026id=2249" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/37810.html" }, { "name": "20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491405/100/0/threaded" }, { "name": "1019945", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019945" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus 7.0.5, and other 7.x versions, when Runtime Behavioural Analysis is enabled, allows local users to cause a denial of service (reboot with the product disabled) and possibly gain privileges via a zero value in a certain length field in the ObjectAttributes argument to the NtCreateKey hooked System Service Descriptor Table (SSDT) function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29996", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29996" }, { "name": "28743", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28743" }, { "name": "3838", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3838" }, { "name": "ADV-2008-1381", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1381" }, { "name": "sophos-ssdt-dos(42083)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42083" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.coresecurity.com/?action=item\u0026id=2249" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/37810.html" }, { "name": "20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/491405/100/0/threaded" }, { "name": "1019945", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019945" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus 7.0.5, and other 7.x versions, when Runtime Behavioural Analysis is enabled, allows local users to cause a denial of service (reboot with the product disabled) and possibly gain privileges via a zero value in a certain length field in the ObjectAttributes argument to the NtCreateKey hooked System Service Descriptor Table (SSDT) function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29996", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29996" }, { "name": "28743", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28743" }, { "name": "3838", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3838" }, { "name": "ADV-2008-1381", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1381" }, { "name": "sophos-ssdt-dos(42083)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42083" }, { "name": "http://www.coresecurity.com/?action=item\u0026id=2249", "refsource": "MISC", "url": "http://www.coresecurity.com/?action=item\u0026id=2249" }, { "name": "http://www.sophos.com/support/knowledgebase/article/37810.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/37810.html" }, { "name": "20080428 CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/491405/100/0/threaded" }, { "name": "1019945", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019945" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1737", "datePublished": "2008-04-29T23:00:00", "dateReserved": "2008-04-11T00:00:00", "dateUpdated": "2024-08-07T08:32:01.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5645
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1018450 | vdb-entry, x_refsource_SECTRACK | |
http://www.sophos.com/support/knowledgebase/article/7609.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1017132 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/4239 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/20816 | vdb-entry, x_refsource_BID | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securityfocus.com/archive/1/474683/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/22591 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:55:54.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1018450", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018450" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439" }, { "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22591" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1018450", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018450" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439" }, { "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "name": "22591", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22591" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus and Endpoint Security before 6.0.5, Anti-Virus for Linux before 5.0.10, and other platforms before 4.11, when \"Enabled scanning of archives\" is set, allows remote attackers to cause a denial of service (infinite loop) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1018450", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018450" }, { "name": "http://www.sophos.com/support/knowledgebase/article/7609.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/7609.html" }, { "name": "1017132", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017132" }, { "name": "ADV-2006-4239", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4239" }, { "name": "20816", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20816" }, { "name": "20061208 Multiple Vendor Antivirus RAR File Denial of Service Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439" }, { "name": "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/474683/100/0/threaded" }, { "name": "22591", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22591" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5645", "datePublished": "2006-11-01T15:00:00", "dateReserved": "2006-11-01T00:00:00", "dateUpdated": "2024-08-07T19:55:54.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4578
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/2972 | vdb-entry, x_refsource_VUPEN | |
http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php | x_refsource_MISC | |
http://www.securityfocus.com/bid/25428 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/26580 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/477864/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.sophos.com/support/knowledgebase/article/28407.html | x_refsource_CONFIRM | |
http://securityreason.com/securityalert/3072 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/477882/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/archive/1/477720/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1018608 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26580" }, { "name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "3072", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3072" }, { "name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018608" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-2972", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "name": "25428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26580" }, { "name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "3072", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3072" }, { "name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "name": "1018608", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018608" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sophos Anti-Virus for Windows and for Unix/Linux before 2.48.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted UPX packed file, resulting from an \"integer cast around\". NOTE: as of 20070828, the vendor says this is a DoS and the researcher says this allows code execution, but the researcher is reliable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-2972", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2972" }, { "name": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php", "refsource": "MISC", "url": "http://www.nruns.com/security_advisory_sophos_upx_infinite_loop_dos.php" }, { "name": "25428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25428" }, { "name": "26580", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26580" }, { "name": "20070827 Re: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477864/100/0/threaded" }, { "name": "http://www.sophos.com/support/knowledgebase/article/28407.html", "refsource": "CONFIRM", "url": "http://www.sophos.com/support/knowledgebase/article/28407.html" }, { "name": "3072", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3072" }, { "name": "20070827 RE: n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477882/100/0/threaded" }, { "name": "20070824 n.runs-SA-2007.027 - Sophos Antivirus UPX parsing Arbitrary CodeExecution Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/477720/100/0/threaded" }, { "name": "1018608", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018608" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4578", "datePublished": "2007-08-28T18:00:00", "dateReserved": "2007-08-28T00:00:00", "dateUpdated": "2024-08-07T15:01:09.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-6904
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/52443 | vdb-entry, x_refsource_XF | |
http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html | x_refsource_MISC | |
http://www.sophos.com/support/knowledgebase/article/50611.html | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=122893252316489&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/32748 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:49:02.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "savscan-armadillo-code-execution(52443)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "name": "32748", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32748" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "savscan-armadillo-code-execution(52443)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "name": "32748", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32748" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Sophos SAVScan 4.33.0 for Linux, and possibly other products and versions, allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via crafted files that have been packed with (1) armadillo, (2) asprotect, or (3) asprotectSKE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "savscan-armadillo-code-execution(52443)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52443" }, { "name": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html", "refsource": "MISC", "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08015.html" }, { "name": "http://www.sophos.com/support/knowledgebase/article/50611.html", "refsource": "MISC", "url": "http://www.sophos.com/support/knowledgebase/article/50611.html" }, { "name": "20081210 [IVIZ-08-015] Sophos Antivirus for Linux vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=122893252316489\u0026w=2" }, { "name": "32748", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32748" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6904", "datePublished": "2009-08-06T01:00:00", "dateReserved": "2009-08-05T00:00:00", "dateUpdated": "2024-08-07T11:49:02.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }