CVE-2012-1442
Published Mar 21, 2012
Last updated 12 years ago
Overview
- Description
- The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C6590DF-9164-4A76-ADEE-9110C5E3588E" }, { "criteria": "cpe:2.3:a:antiy:avl_sdk:2.0.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38855431-9C17-41FE-8325-A3304DECAC92" }, { "criteria": "cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "343D3F40-E028-4AEE-82A4-0A17C1D1ED13" }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:9.0.16160.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB884937-53F0-4BB5-AA8F-1CCDCD1221D9" }, { "criteria": "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C36D1BA-DB17-4FE0-8D6E-BA5649AE3BF0" }, { "criteria": "cpe:2.3:a:kaspersky:kaspersky_anti-virus:7.0.0.125:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD9BCB3B-0FE8-4716-ABC2-1DB89D330F56" }, { "criteria": "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18FC30B1-4FB3-4891-93FE-63A93E686EB3" }, { "criteria": "cpe:2.3:a:mcafee:scan_engine:5.400.0.1158:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BCE1228-61BE-4C10-898A-B8BDC5A71156" }, { "criteria": "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D95F8C32-D238-493F-A28D-8A588E8ADD13" }, { "criteria": "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF8ADA91-4042-4E1B-9F14-78023F24B137" }, { "criteria": "cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0912E21E-1EEB-4ADD-958F-F8AEBBF7C5E6" } ], "operator": "OR" } ] } ]