Vulnerability CVE-2012-1425


Published: 2012-03-21

Description:
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, and Trend Micro HouseCall 9.120.0.1004 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \50\4B\03\04 character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Trendmicro -> Trend micro antivirus 
Trendmicro -> Housecall 
Symantec -> Endpoint protection 
Pc tools -> Pc tools antivirus 
Norman -> Norman antivirus & antispyware 
Mcafee -> Gateway 
Mcafee -> Scan engine 
Kaspersky -> Kaspersky anti-virus 
Jiangmin -> Jiangmin antivirus 
Ikarus -> Ikarus virus utilities t3 command line scanner 
Fortinet -> Fortinet antivirus 
ESET -> Nod32 antivirus 
Emsisoft -> Anti-malware 
CAT -> Quick heal 
Avira -> Antivir 
Antiy -> Avl sdk 

 References:
http://www.securityfocus.com/archive/1/522005
http://www.ieee-security.org/TC/SP2012/program.html

Copyright 2021, cxsecurity.com

 

Back to Top