CVE-2012-1425
Summary
| CVE | CVE-2012-1425 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-03-21 10:11:47 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \50\4B\03\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Antiy | Avl Sdk | 2.0.3.7 | All | All | All |
| Application | Avira | Antivir | 7.11.1.163 | All | All | All |
| Application | Cat | Quick Heal | 11.00 | All | All | All |
| Application | Emsisoft | Anti-malware | 5.1.0.1 | All | All | All |
| Application | Eset | Nod32 Antivirus | 5795 | All | All | All |
| Application | Fortinet | Fortinet Antivirus | 4.2.254.0 | All | All | All |
| Application | Ikarus | Ikarus Virus Utilities T3 Command Line Scanner | 1.1.97.0 | All | All | All |
| Application | Jiangmin | Jiangmin Antivirus | 13.0.900 | All | All | All |
| Application | Kaspersky | Kaspersky Anti-virus | 7.0.0.125 | All | All | All |
| Application | Mcafee | Gateway | 2010.1c | All | All | All |
| Application | Mcafee | Scan Engine | 5.400.0.1158 | All | All | All |
| Application | Norman | Norman Antivirus Antispyware | 6.06.12 | All | All | All |
| Application | Pc Tools | Pc Tools Antivirus | 7.0.3.5 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | All | All | All |
| Application | Trendmicro | Housecall | 9.120.0.1004 | All | All | All |
| Application | Trendmicro | Trend Micro Antivirus | 9.120.0.1004 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| osvdb.org/80389 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80409 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| IEEE Symposium on Security and Privacy 2012 | af854a3a-2127-422b-91ae-364da2661108 | www.ieee-security.org | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| osvdb.org/80403 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80396 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80395 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80392 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80391 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.