CVE-2012-1453
Summary
| CVE | CVE-2012-1453 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-03-21 10:11:00 UTC |
| Updated | 2012-11-06 05:09:00 UTC |
| Description | The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Antiy | Avl Sdk | 2.0.3.7 | All | All | All |
| Application | Antiy | Avl Sdk | 2.0.3.7 | All | All | All |
| Application | Ca | Etrust Vet Antivirus | 36.1.8511 | All | All | All |
| Application | Ca | Etrust Vet Antivirus | 36.1.8511 | All | All | All |
| Application | Drweb | Dr.web Antivirus | 5.0.2.03300 | All | All | All |
| Application | Drweb | Dr.web Antivirus | 5.0.2.03300 | All | All | All |
| Application | Emsisoft | Anti-malware | 5.1.0.1 | All | All | All |
| Application | Emsisoft | Anti-malware | 5.1.0.1 | All | All | All |
| Application | Fortinet | Fortinet Antivirus | 4.2.254.0 | All | All | All |
| Application | Fortinet | Fortinet Antivirus | 4.2.254.0 | All | All | All |
| Application | Ikarus | Ikarus Virus Utilities T3 Command Line Scanner | 1.1.97.0 | All | All | All |
| Application | Ikarus | Ikarus Virus Utilities T3 Command Line Scanner | 1.1.97.0 | All | All | All |
| Application | Kaspersky | Kaspersky Anti-virus | 7.0.0.125 | All | All | All |
| Application | Kaspersky | Kaspersky Anti-virus | 7.0.0.125 | All | All | All |
| Application | Mcafee | Gateway | 2010.1c | All | All | All |
| Application | Mcafee | Gateway | 2010.1c | All | All | All |
| Application | Microsoft | Security Essentials | 2.0 | All | All | All |
| Application | Microsoft | Security Essentials | 2.0 | All | All | All |
| Application | Pandasecurity | Panda Antivirus | 10.0.2.7 | All | All | All |
| Application | Pandasecurity | Panda Antivirus | 10.0.2.7 | All | All | All |
| Application | Rising-global | Rising Antivirus | 22.83.00.03 | All | All | All |
| Application | Rising-global | Rising Antivirus | 22.83.00.03 | All | All | All |
| Application | Sophos | Sophos Anti-virus | 4.61.0 | All | All | All |
| Application | Sophos | Sophos Anti-virus | 4.61.0 | All | All | All |
| Application | Trendmicro | Housecall | 9.120.0.1004 | All | All | All |
| Application | Trendmicro | Housecall | 9.120.0.1004 | All | All | All |
| Application | Trendmicro | Trend Micro Antivirus | 9.120.0.1004 | All | All | All |
| Application | Trendmicro | Trend Micro Antivirus | 9.120.0.1004 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 80489 | OSVDB | osvdb.org | |
| 80487 | OSVDB | osvdb.org | |
| IEEE Symposium on Security and Privacy 2012 | MISC | www.ieee-security.org | |
| 80485 | OSVDB | osvdb.org | |
| Multiple AntiVirus Products CVE-2012-1453 CAB File Scan Evasion Vulnerability | BID | www.securityfocus.com | |
| 80482 | OSVDB | osvdb.org | |
| 80486 | OSVDB | osvdb.org | |
| 80488 | OSVDB | osvdb.org | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 80483 | OSVDB | osvdb.org | |
| 80484 | OSVDB | osvdb.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.