CVE-2012-1453
Summary
| CVE | CVE-2012-1453 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-03-21 10:11:48 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Antiy | Avl Sdk | 2.0.3.7 | All | All | All |
| Application | Ca | Etrust Vet Antivirus | 36.1.8511 | All | All | All |
| Application | Drweb | Dr.web Antivirus | 5.0.2.03300 | All | All | All |
| Application | Emsisoft | Anti-malware | 5.1.0.1 | All | All | All |
| Application | Fortinet | Fortinet Antivirus | 4.2.254.0 | All | All | All |
| Application | Ikarus | Ikarus Virus Utilities T3 Command Line Scanner | 1.1.97.0 | All | All | All |
| Application | Kaspersky | Kaspersky Anti-virus | 7.0.0.125 | All | All | All |
| Application | Mcafee | Gateway | 2010.1c | All | All | All |
| Application | Microsoft | Security Essentials | 2.0 | All | All | All |
| Application | Pandasecurity | Panda Antivirus | 10.0.2.7 | All | All | All |
| Application | Rising-global | Rising Antivirus | 22.83.00.03 | All | All | All |
| Application | Sophos | Sophos Anti-virus | 4.61.0 | All | All | All |
| Application | Trendmicro | Housecall | 9.120.0.1004 | All | All | All |
| Application | Trendmicro | Trend Micro Antivirus | 9.120.0.1004 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| osvdb.org/80486 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80487 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80484 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80485 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| IEEE Symposium on Security and Privacy 2012 | af854a3a-2127-422b-91ae-364da2661108 | www.ieee-security.org | |
| osvdb.org/80483 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80482 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| osvdb.org/80489 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| osvdb.org/80488 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| Multiple AntiVirus Products CVE-2012-1453 CAB File Scan Evasion Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.