The Gzip file parser in Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with stray bytes at the end. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ieee-security.org/TC/SP2012/program.html - | |
References | () http://www.securityfocus.com/archive/1/522005 - | |
References | () http://www.securityfocus.com/bid/52629 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/74308 - |
Information
Published : 2012-03-21 10:11
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1460
Mitre link : CVE-2012-1460
CVE.ORG link : CVE-2012-1460
JSON object : View
Products Affected
cat
- quick_heal
aladdin
- esafe
authentium
- command_antivirus
anti-virus
- vba32
k7computing
- antivirus
f-prot
- f-prot_antivirus
antiy
- avl_sdk
jiangmin
- jiangmin_antivirus
CWE
CWE-264
Permissions, Privileges, and Access Controls