The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/80426 - | |
References | () http://osvdb.org/80427 - | |
References | () http://osvdb.org/80428 - | |
References | () http://www.ieee-security.org/TC/SP2012/program.html - | |
References | () http://www.securityfocus.com/archive/1/522005 - | |
References | () http://www.securityfocus.com/bid/52598 - |
Information
Published : 2012-03-21 10:11
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1442
Mitre link : CVE-2012-1442
CVE.ORG link : CVE-2012-1442
JSON object : View
Products Affected
cat
- quick_heal
pandasecurity
- panda_antivirus
f-secure
- f-secure_anti-virus
aladdin
- esafe
mcafee
- gateway
- scan_engine
sophos
- sophos_anti-virus
antiy
- avl_sdk
kaspersky
- kaspersky_anti-virus
rising-global
- rising_antivirus
fortinet
- fortinet_antivirus
CWE
CWE-264
Permissions, Privileges, and Access Controls