The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Norman Antivirus 6.06.12, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, McAfee Gateway (formerly Webwasher) 2010.1C, Sophos Anti-Virus 4.61.0, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified encoding field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/80426 - | |
References | () http://osvdb.org/80427 - | |
References | () http://osvdb.org/80428 - | |
References | () http://osvdb.org/80430 - | |
References | () http://osvdb.org/80431 - | |
References | () http://www.ieee-security.org/TC/SP2012/program.html - | |
References | () http://www.securityfocus.com/archive/1/522005 - | |
References | () http://www.securityfocus.com/bid/52600 - |
Information
Published : 2012-03-21 10:11
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1446
Mitre link : CVE-2012-1446
CVE.ORG link : CVE-2012-1446
JSON object : View
Products Affected
antiy
- avl_sdk
ca
- etrust_vet_antivirus
sophos
- sophos_anti-virus
rising-global
- rising_antivirus
fortinet
- fortinet_antivirus
aladdin
- esafe
kaspersky
- kaspersky_anti-virus
cat
- quick_heal
mcafee
- scan_engine
- gateway
pandasecurity
- panda_antivirus
pc_tools
- pc_tools_antivirus
norman
- norman_antivirus_\&_antispyware
symantec
- endpoint_protection
CWE
CWE-264
Permissions, Privileges, and Access Controls