CVE-2012-1453

Summary

CVECVE-2012-1453
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2012-03-21 10:11:00 UTC
Updated2012-11-06 05:09:00 UTC
DescriptionThe CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.

Risk And Classification

Problem Types: CWE-264

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Antiy Avl Sdk 2.0.3.7 All All All
Application Antiy Avl Sdk 2.0.3.7 All All All
Application Ca Etrust Vet Antivirus 36.1.8511 All All All
Application Ca Etrust Vet Antivirus 36.1.8511 All All All
Application Drweb Dr.web Antivirus 5.0.2.03300 All All All
Application Drweb Dr.web Antivirus 5.0.2.03300 All All All
Application Emsisoft Anti-malware 5.1.0.1 All All All
Application Emsisoft Anti-malware 5.1.0.1 All All All
Application Fortinet Fortinet Antivirus 4.2.254.0 All All All
Application Fortinet Fortinet Antivirus 4.2.254.0 All All All
Application Ikarus Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0 All All All
Application Ikarus Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0 All All All
Application Kaspersky Kaspersky Anti-virus 7.0.0.125 All All All
Application Kaspersky Kaspersky Anti-virus 7.0.0.125 All All All
Application Mcafee Gateway 2010.1c All All All
Application Mcafee Gateway 2010.1c All All All
Application Microsoft Security Essentials 2.0 All All All
Application Microsoft Security Essentials 2.0 All All All
Application Pandasecurity Panda Antivirus 10.0.2.7 All All All
Application Pandasecurity Panda Antivirus 10.0.2.7 All All All
Application Rising-global Rising Antivirus 22.83.00.03 All All All
Application Rising-global Rising Antivirus 22.83.00.03 All All All
Application Sophos Sophos Anti-virus 4.61.0 All All All
Application Sophos Sophos Anti-virus 4.61.0 All All All
Application Trendmicro Housecall 9.120.0.1004 All All All
Application Trendmicro Housecall 9.120.0.1004 All All All
Application Trendmicro Trend Micro Antivirus 9.120.0.1004 All All All
Application Trendmicro Trend Micro Antivirus 9.120.0.1004 All All All

References

ReferenceSourceLinkTags
80489 OSVDB osvdb.org
80487 OSVDB osvdb.org
IEEE Symposium on Security and Privacy 2012 MISC www.ieee-security.org
80485 OSVDB osvdb.org
Multiple AntiVirus Products CVE-2012-1453 CAB File Scan Evasion Vulnerability BID www.securityfocus.com
80482 OSVDB osvdb.org
80486 OSVDB osvdb.org
80488 OSVDB osvdb.org
SecurityFocus BUGTRAQ www.securityfocus.com
80483 OSVDB osvdb.org
80484 OSVDB osvdb.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report