CVE-2012-1461

The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, and VBA32 3.12.14.2 allows remote attackers to bypass malware detection via a .tar.gz file with multiple compressed streams. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different Gzip parser implementations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:anti-virus:vba32:3.12.14.2:*:*:*:*:*:*:*
cpe:2.3:a:authentium:command_antivirus:5.2.11.5:*:*:*:*:*:*:*
cpe:2.3:a:avg:avg_anti-virus:10.0.0.1190:*:*:*:*:*:*:*
cpe:2.3:a:bitdefender:bitdefender:7.2:*:*:*:*:*:*:*
cpe:2.3:a:emsisoft:anti-malware:5.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:eset:nod32_antivirus:5795:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*
cpe:2.3:a:ikarus:ikarus_virus_utilities_t3_command_line_scanner:1.1.97.0:*:*:*:*:*:*:*
cpe:2.3:a:jiangmin:jiangmin_antivirus:13.0.900:*:*:*:*:*:*:*
cpe:2.3:a:k7computing:antivirus:9.77.3565:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*
cpe:2.3:a:norman:norman_antivirus_\&_antispyware:6.06.12:*:*:*:*:*:*:*
cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*
cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:housecall:9.120.0.1004:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:trend_micro_antivirus:9.120.0.1004:*:*:*:*:*:*:*

History

21 Nov 2024, 01:37

Type Values Removed Values Added
References () http://osvdb.org/80500 - () http://osvdb.org/80500 -
References () http://osvdb.org/80501 - () http://osvdb.org/80501 -
References () http://osvdb.org/80502 - () http://osvdb.org/80502 -
References () http://osvdb.org/80503 - () http://osvdb.org/80503 -
References () http://osvdb.org/80504 - () http://osvdb.org/80504 -
References () http://osvdb.org/80505 - () http://osvdb.org/80505 -
References () http://osvdb.org/80506 - () http://osvdb.org/80506 -
References () http://osvdb.org/80510 - () http://osvdb.org/80510 -
References () http://www.ieee-security.org/TC/SP2012/program.html - () http://www.ieee-security.org/TC/SP2012/program.html -
References () http://www.securityfocus.com/archive/1/522005 - () http://www.securityfocus.com/archive/1/522005 -
References () http://www.securityfocus.com/bid/52626 - () http://www.securityfocus.com/bid/52626 -

Information

Published : 2012-03-21 10:11

Updated : 2024-11-21 01:37


NVD link : CVE-2012-1461

Mitre link : CVE-2012-1461

CVE.ORG link : CVE-2012-1461


JSON object : View

Products Affected

authentium

  • command_antivirus

k7computing

  • antivirus

symantec

  • endpoint_protection

trendmicro

  • trend_micro_antivirus
  • housecall

mcafee

  • scan_engine
  • gateway

eset

  • nod32_antivirus

fortinet

  • fortinet_antivirus

f-secure

  • f-secure_anti-virus

anti-virus

  • vba32

bitdefender

  • bitdefender

rising-global

  • rising_antivirus

ikarus

  • ikarus_virus_utilities_t3_command_line_scanner

norman

  • norman_antivirus_\&_antispyware

avg

  • avg_anti-virus

sophos

  • sophos_anti-virus

emsisoft

  • anti-malware

jiangmin

  • jiangmin_antivirus

kaspersky

  • kaspersky_anti-virus
CWE
CWE-264

Permissions, Privileges, and Access Controls