Vulnerabilites related to f-prot - f-prot_antivirus
Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, K7 AntiVirus 9.77.3565, Norman Antivirus 6.06.12, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \42\5A\68 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, K7 AntiVirus 9.77.3565, Norman Antivirus 6.06.12, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\42\\5A\\68 character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos TAR en el Quick Heal (tambi\u00e9n conocido como Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, K7 AntiVirus 9.77.3565, Norman Antivirus 6.6.12, y Rising Antivirus 22.83.00.03 permite a atacantes remotos eludir la detecci\u00f3n de malware a trav\u00e9s de un archivo POSIX TAR con una secuencia de caracteres inicial \\42\\5A\\68. NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones de analizador TAR."
    }
  ],
  "id": "CVE-2012-1426",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:47.443",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52585"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52585"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
References
cve@mitre.orghttp://osvdb.org/80454
cve@mitre.orghttp://osvdb.org/80455
cve@mitre.orghttp://osvdb.org/80456
cve@mitre.orghttp://osvdb.org/80457
cve@mitre.orghttp://osvdb.org/80458
cve@mitre.orghttp://osvdb.org/80459
cve@mitre.orghttp://osvdb.org/80460
cve@mitre.orghttp://osvdb.org/80461
cve@mitre.orghttp://osvdb.org/80467
cve@mitre.orghttp://osvdb.org/80468
cve@mitre.orghttp://osvdb.org/80469
cve@mitre.orghttp://osvdb.org/80470
cve@mitre.orghttp://osvdb.org/80471
cve@mitre.orghttp://osvdb.org/80472
cve@mitre.orghttp://www.ieee-security.org/TC/SP2012/program.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/522005
cve@mitre.orghttp://www.securityfocus.com/bid/52612
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80454
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80455
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80456
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80457
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80458
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80459
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80460
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80461
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80467
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80468
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80469
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80470
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80471
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80472
af854a3a-2127-422b-91ae-364da2661108http://www.ieee-security.org/TC/SP2012/program.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/522005
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52612



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B91745E-EA83-4C70-BF2D-45A3678FA157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3A2FBE-3113-4CCB-8FCF-54CBD78FDF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7877C5C9-C4CA-406F-A61A-EAFBA846A20D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A0325DA-A137-41E0-BD5E-B892F2166749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38855431-9C17-41FE-8325-A3304DECAC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E62090C-AF41-4032-B9F7-78FEBDB4AAE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B656B8-A7FB-4451-8A32-CB7AB74165F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "953C363B-AD5B-4C53-AAF0-AB6BA4040D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*",
              "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "488ED4D6-0A32-43D5-840C-F76919C41C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B999A-11D2-4AFF-9930-0C06E8BBAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB884937-53F0-4BB5-AA8F-1CCDCD1221D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C36D1BA-DB17-4FE0-8D6E-BA5649AE3BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA047323-54B7-460B-9AA0-88C3C4183218",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1759C4A5-67D1-4722-954A-883694E57FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*",
              "matchCriteriaId": "620DC756-B821-413C-A824-43C221E573AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9BCB3B-0FE8-4716-ABC2-1DB89D330F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C382AA8-5E99-4669-9825-F5BBEEC12907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D386C31F-6114-4A15-B0D5-15686D7EF8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "410EEFDA-CFE6-4DDE-B661-BB01009B0E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0912E21E-1EEB-4ADD-958F-F8AEBBF7C5E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E269D396-3A70-4C4B-9D79-CBBA75C280D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3C3D7B7-3DD1-417E-9488-A3B0F28F75E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "72379F97-0BCA-425A-92AE-9F336866FD07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C656A2-AAAC-494A-A981-A83144070857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos RAR en ClamAV versi\u00f3n 0.96.4, Rising Antivirus versi\u00f3n 22.83.00.03, Quick Heal (tambi\u00e9n se conoce como Cat QuickHeal) versi\u00f3n 11.00, G Data AntiVirus versi\u00f3n 21, AVEngine versi\u00f3n 20101.3.0.103 en Symantec Endpoint Protection versi\u00f3n 11, Command Antivirus versi\u00f3n 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner versi\u00f3n 1.1.97.0, Emsisoft Anti-Malware versi\u00f3n 5.1.0.1, PC Tools AntiVirus versi\u00f3n 7.0.3.5, F-Prot Antivirus versi\u00f3n 4.6.2.117, VirusBuster versi\u00f3n 13.6.151.0, Fortinet  antivirus versi\u00f3n 4.2.254.0, Antiy Labs AVL SDK versi\u00f3n 2.0.3.7, K7 AntiVirus versi\u00f3n 9.77.3565, Trend Micro HouseCall versi\u00f3n 9.120.0.1004, Kaspersky Antivirus versi\u00f3n 7.0.0.125, Jiangmin Antivirus versi\u00f3n 13.0.900, Antimalware Engine versi\u00f3n 1.1.6402.0 en Microsoft Security Essentials versi\u00f3n 2.0, Sophos Anti-Virus versi\u00f3n 4.61.0, NOD32 Antivirus versi\u00f3n 5795, Avira AntiVir versi\u00f3n 7.11.1.163, Norman Antivirus versi\u00f3n 6.06.12, McAfee Anti-Virus Scanning Engine versi\u00f3n 5.400.0.1158, Panda Antivirus versi\u00f3n 10.0.2.7, McAfee Gateway (anteriormente Webwasher) versi\u00f3n 2010.1C, Trend Micro AntiVirus versi\u00f3n 9.120.0.1004, Comodo Antivirus versi\u00f3n 7424, Bitdefender versi\u00f3n 7.2, eSafe versi\u00f3n 7.0.17.0, F-Secure Anti-Virus versi\u00f3n 9.0.16160.0, nProtect Versi\u00f3n antivirus 2011-01-17.01, AhnLab V3 Internet Security versi\u00f3n 2011.01.18.00, AVG Anti-Virus versi\u00f3n 10.0.0.1190, avast! antivirus versiones 4.8.1351.0 y 5.0.677.0, y VBA32 versi\u00f3n 3.12.14.2, permite a los atacantes remotos asistidos por el usuario omitir la detecci\u00f3n de malware por medio de un archivo RAR con una inicial Secuencia de caracteres MZ. NOTA: esto puede ser m\u00e1s tarde SPLIT en varios CVE si se publica informaci\u00f3n adicional que muestra que el error se produjo de manera independiente en diferentes implementaciones de analizador RAR."
    }
  ],
  "id": "CVE-2012-1443",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:48.083",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80454"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80455"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80456"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80457"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80458"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80459"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80460"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80461"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80467"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80468"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80469"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80470"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80471"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80472"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80458"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80460"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80469"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52612"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*",
              "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB884937-53F0-4BB5-AA8F-1CCDCD1221D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D386C31F-6114-4A15-B0D5-15686D7EF8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0912E21E-1EEB-4ADD-958F-F8AEBBF7C5E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\4a\\46\\49\\46 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos ELF en BitDefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (anteriormente Webwasher) 2010.1C, nProtect anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, y Rising Antivirus 22.83.00.03 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo ELF con una secuencia de caracteres \\ 4a \\ 46 \\ 49 \\ 46 en una determinada ubicaci\u00f3n. NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador ELF."
    }
  ],
  "id": "CVE-2012-1431",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:47.630",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E62090C-AF41-4032-B9F7-78FEBDB4AAE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*",
              "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "488ED4D6-0A32-43D5-840C-F76919C41C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B999A-11D2-4AFF-9930-0C06E8BBAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C36D1BA-DB17-4FE0-8D6E-BA5649AE3BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1759C4A5-67D1-4722-954A-883694E57FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*",
              "matchCriteriaId": "620DC756-B821-413C-A824-43C221E573AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9BCB3B-0FE8-4716-ABC2-1DB89D330F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0912E21E-1EEB-4ADD-958F-F8AEBBF7C5E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E269D396-3A70-4C4B-9D79-CBBA75C280D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3C3D7B7-3DD1-417E-9488-A3B0F28F75E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "72379F97-0BCA-425A-92AE-9F336866FD07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos TAR en AVG Anti-Virus 10.0.0.1190, Quick Heal (tambi\u00e9n conocido como Cat QuickHeal) 11.00, Comodo Antivirus 7424, a-squared Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2 .254.0, Ikarus Virus Utilities Comando esc\u00e1ner de la l\u00ednea T3 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee gateway (anteriormente Webwasher) 2010.1C, NOD32 Antivirus 5795 , Norman Antivirus 6.6.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 de Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, y Trend Micro HouseCall 9.120. 0.1004 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo tar con un archivo ZIP adjunto. NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones de tar analizador."
    }
  ],
  "id": "CVE-2012-1456",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:49.240",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80389"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80390"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80391"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52608"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
Impacted products
Vendor Product Version
aladdin esafe 7.0.17.0
anti-virus vba32 3.12.14.2
antiy avl_sdk 2.0.3.7
authentium command_antivirus 5.2.11.5
cat quick_heal 11.00
f-prot f-prot_antivirus 4.6.2.117
jiangmin jiangmin_antivirus 13.0.900
k7computing antivirus 9.77.3565



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A0325DA-A137-41E0-BD5E-B892F2166749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38855431-9C17-41FE-8325-A3304DECAC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*",
              "matchCriteriaId": "620DC756-B821-413C-A824-43C221E573AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos Gzip en Antiy Labs AVL SDK v2.0.3.7, Quick Heal (tambi\u00e9n conocido como Cat QuickHeal) v11.00, Command Antivirus v5.2.11.5, v7.0.17.0 eSafe, F-Prot Antivirus v4.6.2.117, Jiangmin Antivirus v13.0.900, K7 AntiVirus 9.77.3565, y VBA32 v3.12.14.2 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo. tar.gz con los bytes extraviados al final. NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador Gzip."
    }
  ],
  "id": "CVE-2012-1460",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:49.630",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52629"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B999A-11D2-4AFF-9930-0C06E8BBAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C36D1BA-DB17-4FE0-8D6E-BA5649AE3BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9BCB3B-0FE8-4716-ABC2-1DB89D330F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C382AA8-5E99-4669-9825-F5BBEEC12907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\7fELF character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos TAR en Quick Heal (tambi\u00e9n conocido como Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 en el Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.6.12, Panda Antivirus 10.0.2.7, y Rising Antivirus 22.83.00.03 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo TAR POSIX con una secuencia de caracteres inicial \\ 7fELF . NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador TAR."
    }
  ],
  "id": "CVE-2012-1420",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:47.130",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-07-21 16:41
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in the scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allow remote attackers to cause a denial of service via (1) a crafted UPX-compressed file, which triggers an engine crash; (2) a crafted Microsoft Office file, which triggers an infinite loop; or (3) an ASPack-compressed file, which triggers an engine crash.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.11b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E4EE92-115F-48B6-922C-264DDDFDD2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "040605DB-3DFB-4DF9-946B-D93AE02DB404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9593E4C5-549D-433D-80CA-DF8138E6B4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2F33BEF-B8B2-49BE-8B50-3D3771ABFD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12c:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E55BEF2-413C-4FC9-B18E-50813C6261C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12d:*:*:*:*:*:*:*",
              "matchCriteriaId": "747D2275-25A3-4D50-A200-A9C7C6A40492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A14300-3A55-4BBD-8545-C3F935E5884C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.13a:*:*:*:*:*:*:*",
              "matchCriteriaId": "705BF0A5-9F2E-4981-B2B2-7E3B07DBA6B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA69A641-C8E7-47B3-8E4E-7147DFD7F45E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "60EEFB06-71E0-49FE-AFF5-45A56B8EB58F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B1DC4D8-BEE7-4C3D-A33A-2CA61CD1FAEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14c:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3B42D0-A722-41D4-A462-18F2209ACAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14d:*:*:*:*:*:*:*",
              "matchCriteriaId": "061C6A26-4ADB-4861-BA36-A7543B74EA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBCA221-E399-4B49-9740-38884F618C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "386A0CD6-4448-480D-9F30-A3451EEC55AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4B4F752-3197-4E94-B563-F7342F2A6C3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6EAF4A-B549-4E51-9A05-22841BC1F5D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC862A86-5F3A-4E6B-B7E6-3A59AC6EF0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16a:*:*:*:*:*:*:*",
              "matchCriteriaId": "497519D9-FE6A-4956-BBD2-B96F584F781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16b:*:*:*:*:*:*:*",
              "matchCriteriaId": "156C6D3E-ECAF-456D-BAB6-F3D20480FCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22F9A01-6B1D-4CE6-B96D-A62891768618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16d:*:*:*:*:*:*:*",
              "matchCriteriaId": "012133AA-983A-4C8E-BAD8-74446A5B13A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16e:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D1F1043-767A-41E5-9A1C-A03BA53E795C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16f:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A3D4C5-11E7-4D8B-ABC9-E38D51702EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6112DACE-C5E8-4013-81C5-E6769F30A7CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5D4D739-DD1E-46F1-B686-8E0360B07846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B105F2B-7129-44EA-86C9-50E0BAE17A98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0919E321-DD99-41F2-B802-08148708B640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1654D1C-92E7-4862-AA5B-5686FEB5EBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "733BF770-151B-47A1-8B33-22E61ABD9145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCEB557-76D0-415E-9152-3196D2E8B96C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8C7005-B41D-42CD-9507-72ABED19A145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F61110B5-6A92-4116-BCAE-9817989CF566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AB5A102-3AD4-4657-AA43-6548F41D2CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:scanning_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0DCCD35-D5C3-431D-B37C-F53A7D8784D8",
              "versionEndIncluding": "4.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allow remote attackers to cause a denial of service via (1) a crafted UPX-compressed file, which triggers an engine crash; (2) a crafted Microsoft Office file, which triggers an infinite loop; or (3) an ASPack-compressed file, which triggers an engine crash."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades sin especificar en el motor de an\u00e1lisis anterior a 4.4.4 en el  F-Prrot Antivirus anterior a 6.0.9.0, permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de (1) un fichero UPX-comppressed manipulado que provoca una ca\u00edda del motor; (2) mediante un fichero Microsoft Office manipulado que lanza un bucle infinito o (3) mediante un fichero ASPack-compressed que provoca una ca\u00edda del motor."
    }
  ],
  "id": "CVE-2008-3243",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-07-21T16:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31118"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30258"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43868"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43869"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43870"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "488ED4D6-0A32-43D5-840C-F76919C41C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B999A-11D2-4AFF-9930-0C06E8BBAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C36D1BA-DB17-4FE0-8D6E-BA5649AE3BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1759C4A5-67D1-4722-954A-883694E57FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "410EEFDA-CFE6-4DDE-B661-BB01009B0E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C656A2-AAAC-494A-A981-A83144070857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos TAR en el Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.6.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, y VirusBuster 13.6.151.0 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo POSIX TAR con una secuencia de car\u00e1cter inicial MZ. NOTA: esto m\u00e1s adelante se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador TAR."
    }
  ],
  "id": "CVE-2012-1423",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:47.317",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80393"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-07-21 16:41
Modified
2025-04-09 00:30
Severity ?
Summary
The scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allows remote attackers to cause a denial of service (engine crash) via a CHM file with a large nb_dir value that triggers an out-of-bounds read.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.11b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E4EE92-115F-48B6-922C-264DDDFDD2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "040605DB-3DFB-4DF9-946B-D93AE02DB404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9593E4C5-549D-433D-80CA-DF8138E6B4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2F33BEF-B8B2-49BE-8B50-3D3771ABFD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12c:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E55BEF2-413C-4FC9-B18E-50813C6261C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12d:*:*:*:*:*:*:*",
              "matchCriteriaId": "747D2275-25A3-4D50-A200-A9C7C6A40492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A14300-3A55-4BBD-8545-C3F935E5884C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.13a:*:*:*:*:*:*:*",
              "matchCriteriaId": "705BF0A5-9F2E-4981-B2B2-7E3B07DBA6B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA69A641-C8E7-47B3-8E4E-7147DFD7F45E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "60EEFB06-71E0-49FE-AFF5-45A56B8EB58F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B1DC4D8-BEE7-4C3D-A33A-2CA61CD1FAEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14c:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3B42D0-A722-41D4-A462-18F2209ACAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14d:*:*:*:*:*:*:*",
              "matchCriteriaId": "061C6A26-4ADB-4861-BA36-A7543B74EA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBCA221-E399-4B49-9740-38884F618C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "386A0CD6-4448-480D-9F30-A3451EEC55AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4B4F752-3197-4E94-B563-F7342F2A6C3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6EAF4A-B549-4E51-9A05-22841BC1F5D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC862A86-5F3A-4E6B-B7E6-3A59AC6EF0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16a:*:*:*:*:*:*:*",
              "matchCriteriaId": "497519D9-FE6A-4956-BBD2-B96F584F781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16b:*:*:*:*:*:*:*",
              "matchCriteriaId": "156C6D3E-ECAF-456D-BAB6-F3D20480FCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22F9A01-6B1D-4CE6-B96D-A62891768618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16d:*:*:*:*:*:*:*",
              "matchCriteriaId": "012133AA-983A-4C8E-BAD8-74446A5B13A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16e:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D1F1043-767A-41E5-9A1C-A03BA53E795C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16f:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A3D4C5-11E7-4D8B-ABC9-E38D51702EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6112DACE-C5E8-4013-81C5-E6769F30A7CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5D4D739-DD1E-46F1-B686-8E0360B07846",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B105F2B-7129-44EA-86C9-50E0BAE17A98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0919E321-DD99-41F2-B802-08148708B640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1654D1C-92E7-4862-AA5B-5686FEB5EBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "733BF770-151B-47A1-8B33-22E61ABD9145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCEB557-76D0-415E-9152-3196D2E8B96C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8C7005-B41D-42CD-9507-72ABED19A145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F61110B5-6A92-4116-BCAE-9817989CF566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AB5A102-3AD4-4657-AA43-6548F41D2CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:scanning_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0DCCD35-D5C3-431D-B37C-F53A7D8784D8",
              "versionEndIncluding": "4.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allows remote attackers to cause a denial of service (engine crash) via a CHM file with a large nb_dir value that triggers an out-of-bounds read."
    },
    {
      "lang": "es",
      "value": "Motor de an\u00e1lisis  anterior a 4.4.4 en F-Prot Antivirus anterior a 6.0.9.0, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de motor) a trav\u00e9s de un fichero CHM con un valor nb_dir largo, lo que provoca una lectura fuera de rango."
    }
  ],
  "id": "CVE-2008-3244",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-07-21T16:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31118"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30253"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020507"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2124/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2124/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43835"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-10 02:28
Modified
2025-04-09 00:30
Severity ?
Summary
F-Prot Antivirus for Linux x86 Mail Servers 4.6.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
Impacted products
Vendor Product Version
f-prot f-prot_antivirus 4.6.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.6:*:linux_x85_mail_servers:*:*:*:*:*",
              "matchCriteriaId": "A4A80F84-A865-449A-AF95-E17E0CD4193A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "F-Prot Antivirus for Linux x86 Mail Servers 4.6.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file."
    },
    {
      "lang": "es",
      "value": "F-Prot Antivirus para Linux x86 Mail Servers 4.6.6 permite a atacantes remotos evitar una detecci\u00f3n de virus, insertando caracteres inv\u00e1lidos en un contenido codificado base 64 en un fichero MIME multipart/mixed, como se demuestra con el fichero de testeo EICAR."
    }
  ],
  "id": "CVE-2006-6407",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-10T02:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.quantenblog.net/security/virus-scanner-bypass"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/453654/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/21461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.quantenblog.net/security/virus-scanner-bypass"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/453654/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21461"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-05 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file. NOTE: this issue has at least a partial overlap with CVE-2006-6294.
References
cve@mitre.orghttp://gleg.net/fprot.txt
cve@mitre.orghttp://gleg.net/vulndisco_meta.shtmlExploit
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html
cve@mitre.orghttp://secunia.com/advisories/22879Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23328Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200612-12.xml
cve@mitre.orghttp://securitytracker.com/id?1017331
cve@mitre.orghttp://www.f-prot.com/news/gen_news/061201_release_unix467.html
cve@mitre.orghttp://www.osvdb.org/30406
cve@mitre.orghttp://www.securityfocus.com/archive/1/453475/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/21086Patch, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4830Vendor Advisory
cve@mitre.orghttps://www.exploit-db.com/exploits/2893
af854a3a-2127-422b-91ae-364da2661108http://gleg.net/fprot.txt
af854a3a-2127-422b-91ae-364da2661108http://gleg.net/vulndisco_meta.shtmlExploit
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22879Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23328Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200612-12.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017331
af854a3a-2127-422b-91ae-364da2661108http://www.f-prot.com/news/gen_news/061201_release_unix467.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/30406
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/453475/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21086Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4830Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/2893



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDF49B67-6377-404E-8C47-320B4C9C5299",
              "versionEndIncluding": "4.6.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.11b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E4EE92-115F-48B6-922C-264DDDFDD2CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "040605DB-3DFB-4DF9-946B-D93AE02DB404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9593E4C5-549D-433D-80CA-DF8138E6B4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2F33BEF-B8B2-49BE-8B50-3D3771ABFD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12c:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E55BEF2-413C-4FC9-B18E-50813C6261C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.12d:*:*:*:*:*:*:*",
              "matchCriteriaId": "747D2275-25A3-4D50-A200-A9C7C6A40492",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A14300-3A55-4BBD-8545-C3F935E5884C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.13a:*:*:*:*:*:*:*",
              "matchCriteriaId": "705BF0A5-9F2E-4981-B2B2-7E3B07DBA6B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA69A641-C8E7-47B3-8E4E-7147DFD7F45E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "60EEFB06-71E0-49FE-AFF5-45A56B8EB58F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B1DC4D8-BEE7-4C3D-A33A-2CA61CD1FAEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14c:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3B42D0-A722-41D4-A462-18F2209ACAF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14d:*:*:*:*:*:*:*",
              "matchCriteriaId": "061C6A26-4ADB-4861-BA36-A7543B74EA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.14e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBCA221-E399-4B49-9740-38884F618C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "386A0CD6-4448-480D-9F30-A3451EEC55AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15a:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4B4F752-3197-4E94-B563-F7342F2A6C3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.15b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6EAF4A-B549-4E51-9A05-22841BC1F5D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC862A86-5F3A-4E6B-B7E6-3A59AC6EF0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16a:*:*:*:*:*:*:*",
              "matchCriteriaId": "497519D9-FE6A-4956-BBD2-B96F584F781B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16b:*:*:*:*:*:*:*",
              "matchCriteriaId": "156C6D3E-ECAF-456D-BAB6-F3D20480FCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C22F9A01-6B1D-4CE6-B96D-A62891768618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16d:*:*:*:*:*:*:*",
              "matchCriteriaId": "012133AA-983A-4C8E-BAD8-74446A5B13A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16e:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D1F1043-767A-41E5-9A1C-A03BA53E795C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:3.16f:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A3D4C5-11E7-4D8B-ABC9-E38D51702EA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file. NOTE: this issue has at least a partial overlap with CVE-2006-6294."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en FRISK Software F-Prot Antivirus 3.16f anterior al 4.6.7 permite a atacantes con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de ficheros CHM manipulados. NOTA: Esta vulnerabilidad tiene, por lo menos una parte, solapada con la CVE-2006-6294."
    }
  ],
  "id": "CVE-2006-6293",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-05T11:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://gleg.net/fprot.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://gleg.net/vulndisco_meta.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22879"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23328"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017331"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/30406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/21086"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4830"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/2893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://gleg.net/fprot.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://gleg.net/vulndisco_meta.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017331"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/30406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/21086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/2893"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
cve@mitre.orghttp://osvdb.org/80389
cve@mitre.orghttp://osvdb.org/80391
cve@mitre.orghttp://osvdb.org/80392
cve@mitre.orghttp://osvdb.org/80393
cve@mitre.orghttp://osvdb.org/80395
cve@mitre.orghttp://osvdb.org/80396
cve@mitre.orghttp://osvdb.org/80403
cve@mitre.orghttp://osvdb.org/80406
cve@mitre.orghttp://osvdb.org/80407
cve@mitre.orghttp://osvdb.org/80409
cve@mitre.orghttp://www.ieee-security.org/TC/SP2012/program.html
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2012:094
cve@mitre.orghttp://www.securityfocus.com/archive/1/522005
cve@mitre.orghttp://www.securityfocus.com/bid/52610
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/74293
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80389
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80391
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80392
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80393
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80395
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80396
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80403
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80406
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80407
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80409
af854a3a-2127-422b-91ae-364da2661108http://www.ieee-security.org/TC/SP2012/program.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:094
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/522005
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52610
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/74293



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3A2FBE-3113-4CCB-8FCF-54CBD78FDF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7877C5C9-C4CA-406F-A61A-EAFBA846A20D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A0325DA-A137-41E0-BD5E-B892F2166749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38855431-9C17-41FE-8325-A3304DECAC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E62090C-AF41-4032-B9F7-78FEBDB4AAE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B656B8-A7FB-4451-8A32-CB7AB74165F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "953C363B-AD5B-4C53-AAF0-AB6BA4040D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "488ED4D6-0A32-43D5-840C-F76919C41C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B999A-11D2-4AFF-9930-0C06E8BBAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA047323-54B7-460B-9AA0-88C3C4183218",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1759C4A5-67D1-4722-954A-883694E57FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*",
              "matchCriteriaId": "620DC756-B821-413C-A824-43C221E573AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9BCB3B-0FE8-4716-ABC2-1DB89D330F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C382AA8-5E99-4669-9825-F5BBEEC12907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "410EEFDA-CFE6-4DDE-B661-BB01009B0E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E269D396-3A70-4C4B-9D79-CBBA75C280D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3C3D7B7-3DD1-417E-9488-A3B0F28F75E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "72379F97-0BCA-425A-92AE-9F336866FD07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C656A2-AAAC-494A-A981-A83144070857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos TAR en Avira AntiVir versi\u00f3n 7.11.1.163, Antiy Labs AVL SDK versi\u00f3n 2.0.3.7, avast! antivirus versiones 4.8.1351.0 y 5.0.677.0, AVG Anti-Virus versi\u00f3n 10.0.0.1190, Bitdefender versi\u00f3n 7.2, Quick Heal (tambi\u00e9n se conoce como Cat QuickHeal) versi\u00f3n 11.00, ClamAV versi\u00f3n 0.96.4, Command Antivirus versi\u00f3n 5.2.11.5, Emsisoft Anti-Malware versi\u00f3n 5.1.0.1, eSafe versi\u00f3n 7.0.17.0, F-Prot antivirus versi\u00f3n 4.6.2.117, G Data AntiVirus versi\u00f3n 21, Ikarus Virus Utilities T3 Command Line Scanner versi\u00f3n 1.1.97.0, Jiangmin Antivirus versi\u00f3n 13.0.900, K7 AntiVirus versi\u00f3n 9.77.3565, Kaspersky Anti-Virus versi\u00f3n 7.0.0.125, McAfee Anti-Virus Scanning Engine versi\u00f3n 5.400.0.1158, McAfee Gateway (anteriormente Webwasher) versi\u00f3n 2010.1C, Antimalware Engine versi\u00f3n 1.1.6402.0 en Microsoft Security Essentials versi\u00f3n 2.0, NOD32 Antivirus versi\u00f3n 5795, Norman Antivirus versi\u00f3n 6.06.12 , PC Tools AntiVirus versi\u00f3n 7.0.3.5, Rising Antivirus versi\u00f3n 22.83.00.03, AVEngine versi\u00f3n 20101.3.0.103 en Symantec Endpoint Protection versi\u00f3n 11, Trend Micro AntiVirus versi\u00f3n 9.120.0.1004, Trend Micro HouseCall versi\u00f3n 9.120.0.1004, VBA32 versi\u00f3n 3.12.14.2 y VirusBuster versi\u00f3n 13.6.151.0 , permite a los atacantes remotos omitir la detecci\u00f3n de malware por medio de una entrada de archivo TAR con un campo de longitud que supera el tama\u00f1o total del archivo TAR. NOTA: esto puede ser m\u00e1s tarde SPLIT en varios CVE si se publica informaci\u00f3n adicional que muestra que el error se produjo de manera independiente en diferentes implementaciones de analizador de TAR."
    }
  ],
  "id": "CVE-2012-1457",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:49.287",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80389"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80391"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80392"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80393"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52610"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-12-29 15:24
Modified
2025-04-09 00:30
Severity ?
Summary
F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a "corrupted" header that still allows the program to be executed. NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor.
Impacted products
Vendor Product Version
f-prot f-prot_antivirus 4.6.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.8:*:linux:*:*:*:*:*",
              "matchCriteriaId": "2F743B76-C8BC-4D16-A216-A5B13C18FFE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a \"corrupted\" header that still allows the program to be executed.  NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor."
    },
    {
      "lang": "es",
      "value": "F-Prot 4.6.8 para GNU/Linux, permite a atacantes remotos evitar la protecci\u00f3n antivirus a trav\u00e9s del programa ELF manipulado mediante una cabecera \"corrupta\" que permite que el programa sea ejecutado. NOTA:  debido a un error en la revelaci\u00f3n inicial, F-secure fue indicado incorrectamente por el fabricante."
    }
  ],
  "id": "CVE-2008-5747",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-12-29T15:24:23.640",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34700"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200904-14.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4822"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/499083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/499305/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/499501/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32753"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34700"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200904-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/499083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/499305/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/499501/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32753"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
cve@mitre.orghttp://osvdb.org/80389
cve@mitre.orghttp://osvdb.org/80390
cve@mitre.orghttp://osvdb.org/80391
cve@mitre.orghttp://osvdb.org/80392
cve@mitre.orghttp://osvdb.org/80393
cve@mitre.orghttp://osvdb.org/80395
cve@mitre.orghttp://osvdb.org/80396
cve@mitre.orghttp://osvdb.org/80403
cve@mitre.orghttp://osvdb.org/80406
cve@mitre.orghttp://osvdb.org/80407
cve@mitre.orghttp://osvdb.org/80409
cve@mitre.orghttp://www.ieee-security.org/TC/SP2012/program.html
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2012:094
cve@mitre.orghttp://www.securityfocus.com/archive/1/522005
cve@mitre.orghttp://www.securityfocus.com/bid/52623
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/74302
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80389
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80390
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80391
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80392
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80393
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80395
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80396
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80403
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80406
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80407
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80409
af854a3a-2127-422b-91ae-364da2661108http://www.ieee-security.org/TC/SP2012/program.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:094
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/522005
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52623
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/74302



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B91745E-EA83-4C70-BF2D-45A3678FA157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alwil:avast_antivirus:4.8.1351.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3A2FBE-3113-4CCB-8FCF-54CBD78FDF52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:alwil:avast_antivirus:5.0.677.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7877C5C9-C4CA-406F-A61A-EAFBA846A20D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A0325DA-A137-41E0-BD5E-B892F2166749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38855431-9C17-41FE-8325-A3304DECAC92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E62090C-AF41-4032-B9F7-78FEBDB4AAE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:7.11.1.163:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B656B8-A7FB-4451-8A32-CB7AB74165F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "953C363B-AD5B-4C53-AAF0-AB6BA4040D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*",
              "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "488ED4D6-0A32-43D5-840C-F76919C41C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B999A-11D2-4AFF-9930-0C06E8BBAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB884937-53F0-4BB5-AA8F-1CCDCD1221D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C36D1BA-DB17-4FE0-8D6E-BA5649AE3BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gdata-software:g_data_antivirus:21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA047323-54B7-460B-9AA0-88C3C4183218",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1759C4A5-67D1-4722-954A-883694E57FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*",
              "matchCriteriaId": "620DC756-B821-413C-A824-43C221E573AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27BD224-CB70-43D2-8B0D-9F229A646B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9BCB3B-0FE8-4716-ABC2-1DB89D330F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:security_essentials:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C382AA8-5E99-4669-9825-F5BBEEC12907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D386C31F-6114-4A15-B0D5-15686D7EF8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pc_tools:pc_tools_antivirus:7.0.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "410EEFDA-CFE6-4DDE-B661-BB01009B0E60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0912E21E-1EEB-4ADD-958F-F8AEBBF7C5E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E269D396-3A70-4C4B-9D79-CBBA75C280D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3C3D7B7-3DD1-417E-9488-A3B0F28F75E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*",
              "matchCriteriaId": "72379F97-0BCA-425A-92AE-9F336866FD07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:virusbuster:virusbuster:13.6.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C656A2-AAAC-494A-A981-A83144070857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos TAR en AhnLab V3 Internet Security versi\u00f3n 2011.01.18.00, Avira AntiVir versi\u00f3n 7.11.1.163, Antiy Labs AVL SDK versi\u00f3n 2.0.3.7, avast! antivirus versiones 4.8.1351.0 y 5.0.677.0, AVG Anti-Virus versi\u00f3n 10.0.0.1190, Bitdefender versi\u00f3n 7.2, Quick Heal (tambi\u00e9n se conoce como Cat QuickHeal) versi\u00f3n 11.00, ClamAV versi\u00f3n 0.96.4, Command Antivirus versi\u00f3n 5.2.11.5, Comodo Antivirus versi\u00f3n 7424, Emsisoft Anti-Malware versi\u00f3n 5.1.0.1, F-Prot Antivirus versi\u00f3n 4.6.2.117, F-Secure Anti-Virus versi\u00f3n 9.0.16160.0, Fortinet Antivirus versi\u00f3n 4.2.254.0, G Data AntiVirus versi\u00f3n 21, Ikarus Virus Utilities T3 Command Line Scanner versi\u00f3n 1.1.97.0, Jiangmin Antivirus versi\u00f3n 13.0.900, K7 AntiVirus versi\u00f3n 9.77.3565, Kaspersky Anti-Virus versi\u00f3n 7.0.0.125, McAfee Anti-Virus Scanning Engine versi\u00f3n 5.400.0.1158, McAfee Gateway (anteriormente Webwasher) versi\u00f3n 2010.1C, Antimalware Engine versi\u00f3n 1.1.6402.0 en Microsoft Security Essentials versi\u00f3n 2.0, NOD32 Antivirus versi\u00f3n 5795, Norman Antivirus  versi\u00f3n 6.06.12, nProtect antivirus versi\u00f3n 2011-01-17.01, Panda Antivirus versi\u00f3n 10.0.2.7, PC Tools AntiVirus versi\u00f3n 7.0.3.5, Rising Antivirus versi\u00f3n 22.83.00.03, Sophos Anti-Virus versi\u00f3n 4.61.0, AVEngine versi\u00f3n 20101.3.0.103 en Symantec Endpoint Protection versi\u00f3n 11, Trend Micro AntiVirus versi\u00f3n 9.120.0.1004, Trend Micro HouseCall versi\u00f3n 9.120.0.1004, VBA32 versi\u00f3n 3.12.14.2 y VirusBuster versi\u00f3n 13.6.151.0, permite a los atacantes remotos omitir la detecci\u00f3n de malware por medio de una entrada de archivo TAR con un campo de longitud correspondiente a toda la entrada, adem\u00e1s de parte del encabezado de la siguiente entrada. NOTA: esto puede ser m\u00e1s tarde SPLIT en varios CVE si se publica informaci\u00f3n adicional que muestra que el error se produjo de manera independiente en diferentes implementaciones de analizador de TAR."
    }
  ],
  "id": "CVE-2012-1459",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:49.597",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80389"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80390"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80391"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80392"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80393"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52623"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-05-22 20:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple FRISK Software F-Prot anti-virus products, including Antivirus for Exchange, Linux on IBM zSeries, Linux x86 File Servers, Linux x86 Mail Servers, Linux x86 Workstations, Solaris Mail Servers, Antivirus for Windows, and others, allow remote attackers to bypass malware detection via a crafted CAB archive.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:exchange:*:*:*:*:*:*",
              "matchCriteriaId": "E235C40F-068D-4529-910B-DFFC78D3E8B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:linux_on_ibm_zseries:*:*:*:*:*:*",
              "matchCriteriaId": "EEF8C31A-2B41-41F2-91A3-2F16DE5B4119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:linux_x86_file_servers:*:*:*:*:*:*",
              "matchCriteriaId": "44F21EE4-5335-41D0-AB4B-CA36137772F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:linux_x86_mail_servers:*:*:*:*:*:*",
              "matchCriteriaId": "EC65F491-E7B3-405F-B734-6AB4DA175735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:linux_x86_workstations:*:*:*:*:*:*",
              "matchCriteriaId": "5B4C47DB-7B40-4322-B41C-16F7FFC888BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:solaris_mail_servers:*:*:*:*:*:*",
              "matchCriteriaId": "866B0D8C-6F5E-48A0-B891-C41B2A33DD15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:windows:*:*:*:*:*:*",
              "matchCriteriaId": "BCAF39F4-835D-4BAF-ACE3-3C39625EBBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:*:windows_mail_servers:*:*:*:*:*:*",
              "matchCriteriaId": "8AE486C5-CCE9-49EF-B8A3-FEF0BB0137AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_aves:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C33C37C9-BC92-4BB4-AF0C-264384A63190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_milter:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D5B56C-C89D-42B4-BEB9-297C1DC0497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple FRISK Software F-Prot anti-virus products, including Antivirus for Exchange, Linux on IBM zSeries, Linux x86 File Servers, Linux x86 Mail Servers, Linux x86 Workstations, Solaris Mail Servers, Antivirus for Windows, and others, allow remote attackers to bypass malware detection via a crafted CAB archive."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples productos antivirus FRISK Software F-Prot, incluidos: Antivirus for Exchange, Linux on IBM zSeries, Linux x86 File Servers, Linux x86 Mail Servers, Linux x86 Workstations, Solaris Mail Servers, Antivirus for Windows y otros, permiten a atacantes remotos saltar la detecci\u00f3n de software malicioso mediante un fichero .CAB manipulado."
    }
  ],
  "id": "CVE-2009-1783",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-05-22T20:30:00.907",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/503393/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34896"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/503393/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34896"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50427"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-21 10:11
Modified
2025-04-11 00:51
Severity ?
Summary
The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified endianness field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ahnlab:v3_internet_security:2011.01.18.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B91745E-EA83-4C70-BF2D-45A3678FA157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "192DFD98-11AA-4E7A-A1CB-53FC06FEB20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D7D7FA-20E9-4560-ABC6-154CD918E307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:comodo:comodo_antivirus:7424:*:*:*:*:*:*:*",
              "matchCriteriaId": "803A9A92-A984-43A8-8D27-C9A6FDB19A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:4.6.2.117:*:*:*:*:*:*:*",
              "matchCriteriaId": "961708EB-3124-4147-A36D-BAD9241D0C88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB884937-53F0-4BB5-AA8F-1CCDCD1221D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:norman:norman_antivirus_\\\u0026_antispyware:6.06.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D01633-1000-425D-9026-59C50734956A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nprotect:nprotect_antivirus:2011-01-17.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D386C31F-6114-4A15-B0D5-15686D7EF8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified endianness field.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
    },
    {
      "lang": "es",
      "value": "El analizador de archivos ELF en AhnLab V3 Internet Security v2011.01.18.00, BitDefender v7.2, Quick Heal (tambi\u00e9n conocido como Cat QuickHeal) v11.00, Command Antivirus v5.2.11.5, Comodo Antivirus v7424, eSafe v7.0.17.0, F-Prot Antivirus v4.6.2.117, F-Secure Anti-Virus v9.0.16160.0, McAfee Anti-Virus Scanning Engine v5.400.0.1158, Norman Antivirus v6.6.12, nProtect anti-Virus v2011-01-17.01, y Panda Antivirus v10.0.2.7 permite a atacantes remotos evitar la detecci\u00f3n de malware a trav\u00e9s de un archivo ELF con un campo endianness modificado. NOTA: esto m\u00e1s tarde se puede dividir en varios CVEs si la informaci\u00f3n adicional que se publica muestra que el error se produjo de forma independiente en diferentes implementaciones del analizador ELF."
    }
  ],
  "id": "CVE-2012-1463",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-21T10:11:49.740",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80426"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/80433"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/52614"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/80433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ieee-security.org/TC/SP2012/program.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/522005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/52614"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-04 17:41
Modified
2025-04-09 00:30
Severity ?
Summary
The scanning engine in F-Prot Antivirus 6.2.1 4252 allows remote attackers to cause a denial of service (infinite loop) via a malformed ZIP archive, probably related to invalid offsets.
Impacted products
Vendor Product Version
f-prot f-prot_antivirus 6.2.1.4252
f-prot scanning_engine 4.4.4.56



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f-prot:f-prot_antivirus:6.2.1.4252:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAC7A1F7-882C-4CE4-BA2B-2917632A9F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f-prot:scanning_engine:4.4.4.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "0059EC25-C88A-4236-98E5-0B8DF4A4421A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The scanning engine in F-Prot Antivirus 6.2.1 4252 allows remote attackers to cause a denial of service (infinite loop) via a malformed ZIP archive, probably related to invalid offsets."
    },
    {
      "lang": "es",
      "value": "El motor de exploraci\u00f3n de F-Prot Antivirus 6.2.1 4252 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de archivos ZIP malformados, posiblemente relacionado con offsets inv\u00e1lidos."
    }
  ],
  "id": "CVE-2008-3447",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-04T17:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2008/Jul/0569.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30461"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020612"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2283"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44134"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/6174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2008/Jul/0569.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2283"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/6174"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-6407 (GCVE-0-2006-6407)
Vulnerability from cvelistv5
Published
2006-12-10 02:00
Modified
2024-08-07 20:26
Severity ?
CWE
  • n/a
Summary
F-Prot Antivirus for Linux x86 Mail Servers 4.6.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:26:45.983Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21461",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21461"
          },
          {
            "name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/453654/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.quantenblog.net/security/virus-scanner-bypass"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "F-Prot Antivirus for Linux x86 Mail Servers 4.6.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21461",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21461"
        },
        {
          "name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/453654/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.quantenblog.net/security/virus-scanner-bypass"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6407",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F-Prot Antivirus for Linux x86 Mail Servers 4.6.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21461",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21461"
            },
            {
              "name": "20061206 Multiple Vendor Unusual MIME Encoding Content Filter Bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/453654/100/0/threaded"
            },
            {
              "name": "http://www.quantenblog.net/security/virus-scanner-bypass",
              "refsource": "MISC",
              "url": "http://www.quantenblog.net/security/virus-scanner-bypass"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6407",
    "datePublished": "2006-12-10T02:00:00",
    "dateReserved": "2006-12-09T00:00:00",
    "dateUpdated": "2024-08-07T20:26:45.983Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5747 (GCVE-0-2008-5747)
Vulnerability from cvelistv5
Published
2008-12-29 15:00
Modified
2024-08-07 11:04
Severity ?
CWE
  • n/a
Summary
F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a "corrupted" header that still allows the program to be executed. NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor.
References
http://www.securityfocus.com/archive/1/499083 mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/499501/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/32753 vdb-entry, x_refsource_BID
http://security.gentoo.org/glsa/glsa-200904-14.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/34700 third-party-advisory, x_refsource_SECUNIA
http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html x_refsource_MISC
http://securityreason.com/securityalert/4822 third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/499305/100/0/threaded mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.191Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20081210 [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/499083"
          },
          {
            "name": "20081222 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/499501/100/0/threaded"
          },
          {
            "name": "32753",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32753"
          },
          {
            "name": "GLSA-200904-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200904-14.xml"
          },
          {
            "name": "34700",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34700"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html"
          },
          {
            "name": "4822",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4822"
          },
          {
            "name": "20081216 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/499305/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a \"corrupted\" header that still allows the program to be executed.  NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20081210 [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/499083"
        },
        {
          "name": "20081222 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/499501/100/0/threaded"
        },
        {
          "name": "32753",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32753"
        },
        {
          "name": "GLSA-200904-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200904-14.xml"
        },
        {
          "name": "34700",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34700"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html"
        },
        {
          "name": "4822",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4822"
        },
        {
          "name": "20081216 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/499305/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5747",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "F-Prot 4.6.8 for GNU/Linux allows remote attackers to bypass anti-virus protection via a crafted ELF program with a \"corrupted\" header that still allows the program to be executed.  NOTE: due to an error in the initial disclosure, F-secure was incorrectly stated as the vendor."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20081210 [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/499083"
            },
            {
              "name": "20081222 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/499501/100/0/threaded"
            },
            {
              "name": "32753",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32753"
            },
            {
              "name": "GLSA-200904-14",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200904-14.xml"
            },
            {
              "name": "34700",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34700"
            },
            {
              "name": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html",
              "refsource": "MISC",
              "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html"
            },
            {
              "name": "4822",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4822"
            },
            {
              "name": "20081216 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/499305/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5747",
    "datePublished": "2008-12-29T15:00:00",
    "dateReserved": "2008-12-29T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.191Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3447 (GCVE-0-2008-3447)
Vulnerability from cvelistv5
Published
2008-08-04 17:00
Modified
2024-08-07 09:37
Severity ?
CWE
  • n/a
Summary
The scanning engine in F-Prot Antivirus 6.2.1 4252 allows remote attackers to cause a denial of service (infinite loop) via a malformed ZIP archive, probably related to invalid offsets.
References
http://seclists.org/fulldisclosure/2008/Jul/0569.html mailing-list, x_refsource_FULLDISC
http://www.securitytracker.com/id?1020612 vdb-entry, x_refsource_SECTRACK
https://www.exploit-db.com/exploits/6174 exploit, x_refsource_EXPLOIT-DB
http://www.vupen.com/english/advisories/2008/2283 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31313 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/44134 vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/30461 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.969Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20080731 F-PROT antivirus 6.2.1.4252 infinite loop denial of service via malformed archive",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2008/Jul/0569.html"
          },
          {
            "name": "1020612",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020612"
          },
          {
            "name": "6174",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6174"
          },
          {
            "name": "ADV-2008-2283",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2283"
          },
          {
            "name": "31313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31313"
          },
          {
            "name": "fprotantivirus-infiniteloop-dos(44134)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44134"
          },
          {
            "name": "30461",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30461"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The scanning engine in F-Prot Antivirus 6.2.1 4252 allows remote attackers to cause a denial of service (infinite loop) via a malformed ZIP archive, probably related to invalid offsets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20080731 F-PROT antivirus 6.2.1.4252 infinite loop denial of service via malformed archive",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2008/Jul/0569.html"
        },
        {
          "name": "1020612",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020612"
        },
        {
          "name": "6174",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6174"
        },
        {
          "name": "ADV-2008-2283",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2283"
        },
        {
          "name": "31313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31313"
        },
        {
          "name": "fprotantivirus-infiniteloop-dos(44134)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44134"
        },
        {
          "name": "30461",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30461"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3447",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The scanning engine in F-Prot Antivirus 6.2.1 4252 allows remote attackers to cause a denial of service (infinite loop) via a malformed ZIP archive, probably related to invalid offsets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20080731 F-PROT antivirus 6.2.1.4252 infinite loop denial of service via malformed archive",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2008/Jul/0569.html"
            },
            {
              "name": "1020612",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020612"
            },
            {
              "name": "6174",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6174"
            },
            {
              "name": "ADV-2008-2283",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2283"
            },
            {
              "name": "31313",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31313"
            },
            {
              "name": "fprotantivirus-infiniteloop-dos(44134)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44134"
            },
            {
              "name": "30461",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30461"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3447",
    "datePublished": "2008-08-04T17:00:00",
    "dateReserved": "2008-08-04T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.969Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1783 (GCVE-0-2009-1783)
Vulnerability from cvelistv5
Published
2009-05-22 20:00
Modified
2024-08-07 05:27
Severity ?
CWE
  • n/a
Summary
Multiple FRISK Software F-Prot anti-virus products, including Antivirus for Exchange, Linux on IBM zSeries, Linux x86 File Servers, Linux x86 Mail Servers, Linux x86 Workstations, Solaris Mail Servers, Antivirus for Windows, and others, allow remote attackers to bypass malware detection via a crafted CAB archive.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:27:54.129Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html"
          },
          {
            "name": "34896",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34896"
          },
          {
            "name": "20090509 [TZO-21-2009] Fprot CAB bypass / evasion",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503393/100/0/threaded"
          },
          {
            "name": "fprot-cab-security-bypass(50427)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50427"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple FRISK Software F-Prot anti-virus products, including Antivirus for Exchange, Linux on IBM zSeries, Linux x86 File Servers, Linux x86 Mail Servers, Linux x86 Workstations, Solaris Mail Servers, Antivirus for Windows, and others, allow remote attackers to bypass malware detection via a crafted CAB archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html"
        },
        {
          "name": "34896",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34896"
        },
        {
          "name": "20090509 [TZO-21-2009] Fprot CAB bypass / evasion",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503393/100/0/threaded"
        },
        {
          "name": "fprot-cab-security-bypass(50427)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50427"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1783",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple FRISK Software F-Prot anti-virus products, including Antivirus for Exchange, Linux on IBM zSeries, Linux x86 File Servers, Linux x86 Mail Servers, Linux x86 Workstations, Solaris Mail Servers, Antivirus for Windows, and others, allow remote attackers to bypass malware detection via a crafted CAB archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html",
              "refsource": "MISC",
              "url": "http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html"
            },
            {
              "name": "34896",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34896"
            },
            {
              "name": "20090509 [TZO-21-2009] Fprot CAB bypass / evasion",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503393/100/0/threaded"
            },
            {
              "name": "fprot-cab-security-bypass(50427)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50427"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1783",
    "datePublished": "2009-05-22T20:00:00",
    "dateReserved": "2009-05-22T00:00:00",
    "dateUpdated": "2024-08-07T05:27:54.129Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1431 (GCVE-0-2012-1431)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-09-17 03:27
Severity ?
CWE
  • n/a
Summary
The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:37.314Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\4a\\46\\49\\46 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-03-21T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1431",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Gateway (formerly Webwasher) 2010.1C, nProtect Anti-Virus 2011-01-17.01, Sophos Anti-Virus 4.61.0, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via an ELF file with a \\4a\\46\\49\\46 character sequence at a certain location.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1431",
    "datePublished": "2012-03-21T10:00:00Z",
    "dateReserved": "2012-02-29T00:00:00Z",
    "dateUpdated": "2024-09-17T03:27:21.793Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3243 (GCVE-0-2008-3243)
Vulnerability from cvelistv5
Published
2008-07-21 16:00
Modified
2024-08-07 09:28
Severity ?
CWE
  • n/a
Summary
Multiple unspecified vulnerabilities in the scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allow remote attackers to cause a denial of service via (1) a crafted UPX-compressed file, which triggers an engine crash; (2) a crafted Microsoft Office file, which triggers an infinite loop; or (3) an ASPack-compressed file, which triggers an engine crash.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:28:41.828Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31118",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31118"
          },
          {
            "name": "fprotantivirus-aspack-dos(43870)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43870"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
          },
          {
            "name": "fprotantivirus-microsoftoffice-dos(43869)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43869"
          },
          {
            "name": "fprotantivirus-upx-dos(43868)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43868"
          },
          {
            "name": "30258",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30258"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allow remote attackers to cause a denial of service via (1) a crafted UPX-compressed file, which triggers an engine crash; (2) a crafted Microsoft Office file, which triggers an infinite loop; or (3) an ASPack-compressed file, which triggers an engine crash."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31118",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31118"
        },
        {
          "name": "fprotantivirus-aspack-dos(43870)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43870"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
        },
        {
          "name": "fprotantivirus-microsoftoffice-dos(43869)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43869"
        },
        {
          "name": "fprotantivirus-upx-dos(43868)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43868"
        },
        {
          "name": "30258",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30258"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3243",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allow remote attackers to cause a denial of service via (1) a crafted UPX-compressed file, which triggers an engine crash; (2) a crafted Microsoft Office file, which triggers an infinite loop; or (3) an ASPack-compressed file, which triggers an engine crash."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31118",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31118"
            },
            {
              "name": "fprotantivirus-aspack-dos(43870)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43870"
            },
            {
              "name": "http://www.f-prot.com/download/ReleaseNotesWindows.txt",
              "refsource": "CONFIRM",
              "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
            },
            {
              "name": "fprotantivirus-microsoftoffice-dos(43869)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43869"
            },
            {
              "name": "fprotantivirus-upx-dos(43868)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43868"
            },
            {
              "name": "30258",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30258"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3243",
    "datePublished": "2008-07-21T16:00:00",
    "dateReserved": "2008-07-21T00:00:00",
    "dateUpdated": "2024-08-07T09:28:41.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3244 (GCVE-0-2008-3244)
Vulnerability from cvelistv5
Published
2008-07-21 16:00
Modified
2024-08-07 09:28
Severity ?
CWE
  • n/a
Summary
The scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allows remote attackers to cause a denial of service (engine crash) via a CHM file with a large nb_dir value that triggers an out-of-bounds read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:28:41.870Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31118",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31118"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
          },
          {
            "name": "ADV-2008-2124",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2124/references"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php"
          },
          {
            "name": "1020507",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020507"
          },
          {
            "name": "30253",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30253"
          },
          {
            "name": "fprotantivirus-chm-dos(43835)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43835"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-07-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allows remote attackers to cause a denial of service (engine crash) via a CHM file with a large nb_dir value that triggers an out-of-bounds read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31118",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31118"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
        },
        {
          "name": "ADV-2008-2124",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2124/references"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php"
        },
        {
          "name": "1020507",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020507"
        },
        {
          "name": "30253",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30253"
        },
        {
          "name": "fprotantivirus-chm-dos(43835)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43835"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3244",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allows remote attackers to cause a denial of service (engine crash) via a CHM file with a large nb_dir value that triggers an out-of-bounds read."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31118",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31118"
            },
            {
              "name": "http://www.f-prot.com/download/ReleaseNotesWindows.txt",
              "refsource": "CONFIRM",
              "url": "http://www.f-prot.com/download/ReleaseNotesWindows.txt"
            },
            {
              "name": "ADV-2008-2124",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2124/references"
            },
            {
              "name": "http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php",
              "refsource": "MISC",
              "url": "http://www.nruns.com/security_advisory_fprot_out-of-bound_memory_access_DoS.php"
            },
            {
              "name": "1020507",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020507"
            },
            {
              "name": "30253",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30253"
            },
            {
              "name": "fprotantivirus-chm-dos(43835)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43835"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3244",
    "datePublished": "2008-07-21T16:00:00",
    "dateReserved": "2008-07-21T00:00:00",
    "dateUpdated": "2024-08-07T09:28:41.870Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1420 (GCVE-0-2012-1420)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 18:53
Severity ?
CWE
  • n/a
Summary
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
http://osvdb.org/80406 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80403 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80409 vdb-entry, x_refsource_OSVDB
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80407 vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:37.450Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "80406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80406"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80403",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80403"
          },
          {
            "name": "80409",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80409"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80407",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80407"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\7fELF character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "80406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80406"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80403",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80403"
        },
        {
          "name": "80409",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80409"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80407",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80407"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1420",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\7fELF character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "80406",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80406"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80403",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80403"
            },
            {
              "name": "80409",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80409"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80407",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80407"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1420",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T18:53:37.450Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1459 (GCVE-0-2012-1459)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 19:01
Severity ?
CWE
  • n/a
Summary
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html vendor-advisory, x_refsource_SUSE
http://osvdb.org/80406 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80393 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80403 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80389 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80391 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80409 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80396 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/74302 vdb-entry, x_refsource_XF
http://osvdb.org/80392 vdb-entry, x_refsource_OSVDB
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80390 vdb-entry, x_refsource_OSVDB
http://www.mandriva.com/security/advisories?name=MDVSA-2012:094 vendor-advisory, x_refsource_MANDRIVA
http://osvdb.org/80407 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80395 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/52623 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:01.248Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2012:0833",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
          },
          {
            "name": "80406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80406"
          },
          {
            "name": "80393",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80393"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80403",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80403"
          },
          {
            "name": "80389",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80389"
          },
          {
            "name": "80391",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80391"
          },
          {
            "name": "80409",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80409"
          },
          {
            "name": "80396",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80396"
          },
          {
            "name": "multiple-av-tar-header-evasion(74302)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302"
          },
          {
            "name": "80392",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80392"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80390",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80390"
          },
          {
            "name": "MDVSA-2012:094",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
          },
          {
            "name": "80407",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80407"
          },
          {
            "name": "80395",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80395"
          },
          {
            "name": "52623",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52623"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openSUSE-SU-2012:0833",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
        },
        {
          "name": "80406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80406"
        },
        {
          "name": "80393",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80393"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80403",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80403"
        },
        {
          "name": "80389",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80389"
        },
        {
          "name": "80391",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80391"
        },
        {
          "name": "80409",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80409"
        },
        {
          "name": "80396",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80396"
        },
        {
          "name": "multiple-av-tar-header-evasion(74302)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302"
        },
        {
          "name": "80392",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80392"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80390",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80390"
        },
        {
          "name": "MDVSA-2012:094",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
        },
        {
          "name": "80407",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80407"
        },
        {
          "name": "80395",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80395"
        },
        {
          "name": "52623",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52623"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1459",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2012:0833",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
            },
            {
              "name": "80406",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80406"
            },
            {
              "name": "80393",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80393"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80403",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80403"
            },
            {
              "name": "80389",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80389"
            },
            {
              "name": "80391",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80391"
            },
            {
              "name": "80409",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80409"
            },
            {
              "name": "80396",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80396"
            },
            {
              "name": "multiple-av-tar-header-evasion(74302)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302"
            },
            {
              "name": "80392",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80392"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80390",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80390"
            },
            {
              "name": "MDVSA-2012:094",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
            },
            {
              "name": "80407",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80407"
            },
            {
              "name": "80395",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80395"
            },
            {
              "name": "52623",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52623"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1459",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T19:01:01.248Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1456 (GCVE-0-2012-1456)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 19:01
Severity ?
CWE
  • n/a
Summary
The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
http://osvdb.org/80406 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80403 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80389 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80391 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/74289 vdb-entry, x_refsource_XF
http://osvdb.org/80409 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80396 vdb-entry, x_refsource_OSVDB
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80390 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/52608 vdb-entry, x_refsource_BID
http://osvdb.org/80395 vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:00.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "80406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80406"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80403",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80403"
          },
          {
            "name": "80389",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80389"
          },
          {
            "name": "80391",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80391"
          },
          {
            "name": "multiple-av-zip-archive-evasion(74289)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289"
          },
          {
            "name": "80409",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80409"
          },
          {
            "name": "80396",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80396"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80390",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80390"
          },
          {
            "name": "52608",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52608"
          },
          {
            "name": "80395",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80395"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "80406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80406"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80403",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80403"
        },
        {
          "name": "80389",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80389"
        },
        {
          "name": "80391",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80391"
        },
        {
          "name": "multiple-av-zip-archive-evasion(74289)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289"
        },
        {
          "name": "80409",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80409"
        },
        {
          "name": "80396",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80396"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80390",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80390"
        },
        {
          "name": "52608",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52608"
        },
        {
          "name": "80395",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80395"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1456",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TAR file parser in AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a TAR file with an appended ZIP file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "80406",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80406"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80403",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80403"
            },
            {
              "name": "80389",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80389"
            },
            {
              "name": "80391",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80391"
            },
            {
              "name": "multiple-av-zip-archive-evasion(74289)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289"
            },
            {
              "name": "80409",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80409"
            },
            {
              "name": "80396",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80396"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80390",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80390"
            },
            {
              "name": "52608",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52608"
            },
            {
              "name": "80395",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80395"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1456",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T19:01:00.493Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1460 (GCVE-0-2012-1460)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 19:01
Severity ?
CWE
  • n/a
Summary
The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:02.127Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "52629",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52629"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "multiple-av-tar-gzip-evasion(74308)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "52629",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52629"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "multiple-av-tar-gzip-evasion(74308)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1460",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "52629",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52629"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "multiple-av-tar-gzip-evasion(74308)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1460",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T19:01:02.127Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6293 (GCVE-0-2006-6293)
Vulnerability from cvelistv5
Published
2006-12-05 11:00
Modified
2024-08-07 20:19
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file. NOTE: this issue has at least a partial overlap with CVE-2006-6294.
References
http://gleg.net/vulndisco_meta.shtml x_refsource_MISC
http://secunia.com/advisories/23328 third-party-advisory, x_refsource_SECUNIA
http://www.f-prot.com/news/gen_news/061201_release_unix467.html x_refsource_CONFIRM
http://secunia.com/advisories/22879 third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/30406 vdb-entry, x_refsource_OSVDB
http://securitytracker.com/id?1017331 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/21086 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/453475/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://gleg.net/fprot.txt x_refsource_MISC
http://security.gentoo.org/glsa/glsa-200612-12.xml vendor-advisory, x_refsource_GENTOO
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html mailing-list, x_refsource_FULLDISC
http://www.vupen.com/english/advisories/2006/4830 vdb-entry, x_refsource_VUPEN
https://www.exploit-db.com/exploits/2893 exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:35.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://gleg.net/vulndisco_meta.shtml"
          },
          {
            "name": "23328",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23328"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
          },
          {
            "name": "22879",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22879"
          },
          {
            "name": "30406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/30406"
          },
          {
            "name": "1017331",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017331"
          },
          {
            "name": "21086",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21086"
          },
          {
            "name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://gleg.net/fprot.txt"
          },
          {
            "name": "GLSA-200612-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
          },
          {
            "name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
          },
          {
            "name": "ADV-2006-4830",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4830"
          },
          {
            "name": "2893",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/2893"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file. NOTE: this issue has at least a partial overlap with CVE-2006-6294."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://gleg.net/vulndisco_meta.shtml"
        },
        {
          "name": "23328",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23328"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
        },
        {
          "name": "22879",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22879"
        },
        {
          "name": "30406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/30406"
        },
        {
          "name": "1017331",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017331"
        },
        {
          "name": "21086",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21086"
        },
        {
          "name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://gleg.net/fprot.txt"
        },
        {
          "name": "GLSA-200612-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
        },
        {
          "name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
        },
        {
          "name": "ADV-2006-4830",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4830"
        },
        {
          "name": "2893",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/2893"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in FRISK Software F-Prot Antivirus before 4.6.7 allows user-assisted remote attackers to execute arbitrary code via a crafted CHM file. NOTE: this issue has at least a partial overlap with CVE-2006-6294."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://gleg.net/vulndisco_meta.shtml",
              "refsource": "MISC",
              "url": "http://gleg.net/vulndisco_meta.shtml"
            },
            {
              "name": "23328",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23328"
            },
            {
              "name": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html",
              "refsource": "CONFIRM",
              "url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
            },
            {
              "name": "22879",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22879"
            },
            {
              "name": "30406",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/30406"
            },
            {
              "name": "1017331",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017331"
            },
            {
              "name": "21086",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21086"
            },
            {
              "name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
            },
            {
              "name": "http://gleg.net/fprot.txt",
              "refsource": "MISC",
              "url": "http://gleg.net/fprot.txt"
            },
            {
              "name": "GLSA-200612-12",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
            },
            {
              "name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
            },
            {
              "name": "ADV-2006-4830",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4830"
            },
            {
              "name": "2893",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/2893"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6293",
    "datePublished": "2006-12-05T11:00:00",
    "dateReserved": "2006-12-05T00:00:00",
    "dateUpdated": "2024-08-07T20:19:35.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1463 (GCVE-0-2012-1463)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 19:01
Severity ?
CWE
  • n/a
Summary
The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified endianness field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
References
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80433 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/52614 vdb-entry, x_refsource_BID
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80426 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/74311 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:02.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80433",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80433"
          },
          {
            "name": "52614",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52614"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80426",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80426"
          },
          {
            "name": "multiple-av-elf-file-evasion(74311)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified endianness field.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80433",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80433"
        },
        {
          "name": "52614",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52614"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80426",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80426"
        },
        {
          "name": "multiple-av-elf-file-evasion(74311)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1463",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified endianness field.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80433",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80433"
            },
            {
              "name": "52614",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52614"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80426",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80426"
            },
            {
              "name": "multiple-av-elf-file-evasion(74311)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1463",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T19:01:02.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1457 (GCVE-0-2012-1457)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 19:01
Severity ?
CWE
  • n/a
Summary
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html vendor-advisory, x_refsource_SUSE
http://osvdb.org/80406 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80393 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80403 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80389 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80391 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80409 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80396 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80392 vdb-entry, x_refsource_OSVDB
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://www.mandriva.com/security/advisories?name=MDVSA-2012:094 vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/52610 vdb-entry, x_refsource_BID
http://osvdb.org/80407 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80395 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/74293 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:00.540Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2012:0833",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
          },
          {
            "name": "80406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80406"
          },
          {
            "name": "80393",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80393"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80403",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80403"
          },
          {
            "name": "80389",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80389"
          },
          {
            "name": "80391",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80391"
          },
          {
            "name": "80409",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80409"
          },
          {
            "name": "80396",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80396"
          },
          {
            "name": "80392",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80392"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "MDVSA-2012:094",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
          },
          {
            "name": "52610",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52610"
          },
          {
            "name": "80407",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80407"
          },
          {
            "name": "80395",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80395"
          },
          {
            "name": "multiple-av-tar-length-evasion(74293)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openSUSE-SU-2012:0833",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
        },
        {
          "name": "80406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80406"
        },
        {
          "name": "80393",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80393"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80403",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80403"
        },
        {
          "name": "80389",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80389"
        },
        {
          "name": "80391",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80391"
        },
        {
          "name": "80409",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80409"
        },
        {
          "name": "80396",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80396"
        },
        {
          "name": "80392",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80392"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "MDVSA-2012:094",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
        },
        {
          "name": "52610",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52610"
        },
        {
          "name": "80407",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80407"
        },
        {
          "name": "80395",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80395"
        },
        {
          "name": "multiple-av-tar-length-evasion(74293)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1457",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2012:0833",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html"
            },
            {
              "name": "80406",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80406"
            },
            {
              "name": "80393",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80393"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80403",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80403"
            },
            {
              "name": "80389",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80389"
            },
            {
              "name": "80391",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80391"
            },
            {
              "name": "80409",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80409"
            },
            {
              "name": "80396",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80396"
            },
            {
              "name": "80392",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80392"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "MDVSA-2012:094",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094"
            },
            {
              "name": "52610",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52610"
            },
            {
              "name": "80407",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80407"
            },
            {
              "name": "80395",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80395"
            },
            {
              "name": "multiple-av-tar-length-evasion(74293)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1457",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T19:01:00.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1443 (GCVE-0-2012-1443)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 19:01
Severity ?
CWE
  • n/a
Summary
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
References
http://osvdb.org/80472 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/52612 vdb-entry, x_refsource_BID
http://osvdb.org/80467 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80461 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80470 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80460 vdb-entry, x_refsource_OSVDB
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80468 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80456 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80457 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80458 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80454 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80455 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80459 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80469 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80471 vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:00.328Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "80472",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80472"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "52612",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52612"
          },
          {
            "name": "80467",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80467"
          },
          {
            "name": "80461",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80461"
          },
          {
            "name": "80470",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80470"
          },
          {
            "name": "80460",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80460"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80468",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80468"
          },
          {
            "name": "80456",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80456"
          },
          {
            "name": "80457",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80457"
          },
          {
            "name": "80458",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80458"
          },
          {
            "name": "80454",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80454"
          },
          {
            "name": "80455",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80455"
          },
          {
            "name": "80459",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80459"
          },
          {
            "name": "80469",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80469"
          },
          {
            "name": "80471",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80471"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-07-28T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "80472",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80472"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "52612",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52612"
        },
        {
          "name": "80467",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80467"
        },
        {
          "name": "80461",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80461"
        },
        {
          "name": "80470",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80470"
        },
        {
          "name": "80460",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80460"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80468",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80468"
        },
        {
          "name": "80456",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80456"
        },
        {
          "name": "80457",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80457"
        },
        {
          "name": "80458",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80458"
        },
        {
          "name": "80454",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80454"
        },
        {
          "name": "80455",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80455"
        },
        {
          "name": "80459",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80459"
        },
        {
          "name": "80469",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80469"
        },
        {
          "name": "80471",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80471"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1443",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "80472",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80472"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "52612",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52612"
            },
            {
              "name": "80467",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80467"
            },
            {
              "name": "80461",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80461"
            },
            {
              "name": "80470",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80470"
            },
            {
              "name": "80460",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80460"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80468",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80468"
            },
            {
              "name": "80456",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80456"
            },
            {
              "name": "80457",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80457"
            },
            {
              "name": "80458",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80458"
            },
            {
              "name": "80454",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80454"
            },
            {
              "name": "80455",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80455"
            },
            {
              "name": "80459",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80459"
            },
            {
              "name": "80469",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80469"
            },
            {
              "name": "80471",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80471"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1443",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T19:01:00.328Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1423 (GCVE-0-2012-1423)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 18:53
Severity ?
CWE
  • n/a
Summary
The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
http://osvdb.org/80406 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80393 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80396 vdb-entry, x_refsource_OSVDB
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80407 vdb-entry, x_refsource_OSVDB
http://osvdb.org/80395 vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:37.278Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "80406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80406"
          },
          {
            "name": "80393",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80393"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80396",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80396"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80407",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80407"
          },
          {
            "name": "80395",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80395"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "80406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80406"
        },
        {
          "name": "80393",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80393"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80396",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80396"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80407",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80407"
        },
        {
          "name": "80395",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80395"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TAR file parser in Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, K7 AntiVirus 9.77.3565, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "80406",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80406"
            },
            {
              "name": "80393",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80393"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80396",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80396"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80407",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80407"
            },
            {
              "name": "80395",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80395"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1423",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T18:53:37.278Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1426 (GCVE-0-2012-1426)
Vulnerability from cvelistv5
Published
2012-03-21 10:00
Modified
2024-08-06 18:53
Severity ?
CWE
  • n/a
Summary
The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, K7 AntiVirus 9.77.3565, Norman Antivirus 6.06.12, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \42\5A\68 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
References
http://osvdb.org/80406 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/522005 mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/80409 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/52585 vdb-entry, x_refsource_BID
http://www.ieee-security.org/TC/SP2012/program.html x_refsource_MISC
http://osvdb.org/80407 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/74241 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:37.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "80406",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80406"
          },
          {
            "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/522005"
          },
          {
            "name": "80409",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80409"
          },
          {
            "name": "52585",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52585"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ieee-security.org/TC/SP2012/program.html"
          },
          {
            "name": "80407",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80407"
          },
          {
            "name": "multiple-av-tar-evasion-cve20121426(74241)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, K7 AntiVirus 9.77.3565, Norman Antivirus 6.06.12, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\42\\5A\\68 character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "80406",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80406"
        },
        {
          "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/522005"
        },
        {
          "name": "80409",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80409"
        },
        {
          "name": "52585",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52585"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ieee-security.org/TC/SP2012/program.html"
        },
        {
          "name": "80407",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80407"
        },
        {
          "name": "multiple-av-tar-evasion-cve20121426(74241)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-1426",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, K7 AntiVirus 9.77.3565, Norman Antivirus 6.06.12, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \\42\\5A\\68 character sequence.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "80406",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80406"
            },
            {
              "name": "20120319 Evasion attacks expoliting file-parsing vulnerabilities in antivirus products",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/522005"
            },
            {
              "name": "80409",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80409"
            },
            {
              "name": "52585",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52585"
            },
            {
              "name": "http://www.ieee-security.org/TC/SP2012/program.html",
              "refsource": "MISC",
              "url": "http://www.ieee-security.org/TC/SP2012/program.html"
            },
            {
              "name": "80407",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/80407"
            },
            {
              "name": "multiple-av-tar-evasion-cve20121426(74241)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-1426",
    "datePublished": "2012-03-21T10:00:00",
    "dateReserved": "2012-02-29T00:00:00",
    "dateUpdated": "2024-08-06T18:53:37.375Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}